Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
8291bbe442ef62c62b6248d17e363351_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8291bbe442ef62c62b6248d17e363351_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
8291bbe442ef62c62b6248d17e363351_JaffaCakes118.html
-
Size
53KB
-
MD5
8291bbe442ef62c62b6248d17e363351
-
SHA1
db494f03b42c52b369fb3d11d919f04c42a7f66d
-
SHA256
1d8c58fe36730262011d4a3bd5dbd91fbe7c26168db4bcdc0cd637b47d4a29d1
-
SHA512
89e035116687f4f9e0f5f19162e1aa4535ad03fc03b0c7f04944371c091ef70d7256d3365a4aa1c9eb3e3f446c225249907f10c0d753e4f55cde5edc99ca63aa
-
SSDEEP
1536:CkgUiIakTqGivi+PyUJrunlY263Nj+q5VyvR0w2AzTICbbKo3/t9M/dNwIUTDmDo:CkgUiIakTqGivi+PyUJrunlY263Nj+qM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703ca4937de4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428724930" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BDCA84A1-5070-11EF-ABF5-46A49AEEEEC8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000b4ef56785c387f8051b3888f4b85db7a7d21c76283f013f1168ab196d870a738000000000e8000000002000020000000ca0ef52e2129626b1fbaeead4aad51270f1d80859f79db29400ea9dadff9cab92000000051a417eeba875cdfe628af2bfd86ca3cd176cff9447444ce8cba133799c03f1e40000000d06f2728462e0de6b3f95b3ae68d0a2bc43d29210c85438860a9910cbe4b4e430696a9bc79f553366c4581f9c6e767df513f0a7f5f71254da2d10642b3469e3b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2724 iexplore.exe 2724 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2660 2724 iexplore.exe 30 PID 2724 wrote to memory of 2660 2724 iexplore.exe 30 PID 2724 wrote to memory of 2660 2724 iexplore.exe 30 PID 2724 wrote to memory of 2660 2724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8291bbe442ef62c62b6248d17e363351_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5036f0a22a6c7818e57c17657a8979746
SHA12c33c43e7c74d61d273278295e60f82d6cd7a0ad
SHA256e825b0e089685c6cc0eda6d8d979010b471740eedd28aa9212e45fc59c0f314d
SHA51294dc08e0c490eaaeac49982559fc8af274e99035f20617a748e3dc7b8b2bb064e1c94b95b8522b971eaa63557eb582cc5d3ee3e857b32c44fb6589232187914f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD592de11174c8a745dd5897cbcd94935b7
SHA121aca109feb08a5be819f1acb0c3549f556cdc22
SHA256cab67175b4325a4a609df81920c57b15506bd81dfa40824e6dcb34716afbbf2a
SHA512ca8670f631fca5769f89ea3d82d02c3138547aa9d979c9354e695ef1e5ce4d01d88aa05f6842634cb0247dc6264293c91c6a8865426436b88078eca0f0dae70f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c717773e3c0b298320dc0dbfd3dc0815
SHA1ae593b7eaefb5bcd08d6fd7909c8b3a52448eac9
SHA25645a3107a37eb98ac4322507094c2d974cd0d8c75a1674dc1ad8e25215c651814
SHA5121bee807b4affb6dfff5599eff0e87156f2ade55ccddfd0e9fa7dd2d48d66f9af008d8dfbc88d3ffc03d3cd6644a799658c16cdb2396843507cb6cdc046b7a128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57cdd1e106961610ff759434e8e8f6aaf
SHA1d70bd5e425043c8ac9a80ede972b838f8434a4a6
SHA2564282621b3b9be5cd949ae612376ce5bba031f8d893cd960c2f752db4ef862eb2
SHA51277047800e12654ee3df5bc29bfadadede0656cdbd2b961613809eb71bb1cfbe3219a2bfef85821f70bde0c5dbf3635c1586449c80171b0d252e70b8e8afba8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5279bab18c18a5c64c3b06754d7472305
SHA1058ba022a1ec5678e79d6d167ed3423f56ef214f
SHA256966e4a849878c3f677ddcf8580b53d9f381d16b872d2362a5caacb94730a2f61
SHA5123bef3f6bde1deca5e35f247ce9c6accbef17cca2a212692cb0354a51a9f4249de089749e95a0fa3dcae52d64ade4554583b945cdbecf9d245662d319796c057b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a67547c3df451e07a6705b94e46a1e3f
SHA160ca2ac9dd472697d0e3a6b181d64a56e382031f
SHA2562ce136eb8868db28f9a8827151ba3bc040c0dcff93242c967215768cd4d2e331
SHA512de0eb1c6edd838e25f364156de7564af8ee11c72ca9b47deedd1168423df0649c58fa5d641e39b46e60c28915988f43685beee741432881b3c6f7643045e4fbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5666cd86698512d334711d45a1fafd4c1
SHA14484dca66f0399d443d6996b516a18646414e3f4
SHA256b56f54c1920631f7066ec2e101f013e492408b63b59438a0b5b7176bf24b996f
SHA5122a5e3038c90b7233af9a4311588f44e24b2d9408b62556b74114c8928ba037307055671386f20bde7d2fab68009e973fce6934b7fcd6fd97a2324cc1e1065396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d2524aaf29c3adbac211a797774cb3c8
SHA1df1966a202c825e512d834b0926113fbf01de950
SHA25665c0742a7676600ebb2403db11784badc0ef586968e558ff31de6470a457cd2f
SHA51246aa3850b6601f973174565a8a10c6b8d71dabd1bb9a16deb87496931d08e1979278c1e6f10f005c4973c2bc18b831fddf09bd07e15fdd8d46f2e1f5055f3d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD564e5baeb76f3d141066a5df54d38d857
SHA11b47e3ffde3de4a46d75adff55d945efec67b538
SHA256fe151727e0d710204c03f15ec93c58afd47e534aa6e0a4dfe1a67de3a3e7d0c1
SHA5127f3dae74832493e82cc1409918590fc044d3845624c408c0e17056202a8a11dd73f06321d3f3e359a0c527ebc19c091da5da8e0175f49dc24abcc547bea809de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58649a14f9c460c47e2d640eb4452e1f7
SHA194b92ef0953b2314593cc9a58b15680703ba6115
SHA256c67bcb8ca5f3107894c5670bc2c2abf33e0e7b66c7279dc38c6972cc810cb9bf
SHA5121f0366682e4bfb4bf1943513f3848fdae32ba757375eaf8d1d7afbe5df99875e7e960d84fb691a0c3a466b1cded640c874a214bfdae7118b89436ed74f02e227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ce671a782d93fc936a0386c9cd872bf
SHA1cf37c88c5db461ad23f566373c6b80239a9cc54f
SHA256dc88fe533458e0e44816aa1be17a44896d6b0d34762d7b0eabbb64e66c9d1d99
SHA512a20ddf6550fdf15b858ae626a8821e701fd528f70ce49d361eeb126c8da0f7cb9773397d7d87657ffce775cb96aa4d708446703a2a8cf5e943e89d94bd023983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59fccc41c4eb1eb7a2266a7eb265f5bc9
SHA1dde09231a2cf739777d33a6187b5f799d60b935e
SHA2568d8f2e450b90bb0f0fe508b6062732d266040f9aaba2a8c97b6cb652cd078a0b
SHA512f66dc65c50c9e2a0afbe1084a613a5c776a29ae5f4e4fd33ae9c2192964ba01917c5c426ff2ffa260c50a34db47c30dca0bc13094aec72b997961829fd53a9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD505c9d9986e1d43c5ce30c4037ec2b03b
SHA12085c618347e5c0ca0cba05057d7204708ea57c1
SHA25690b7276cecf20ec9f4a2490ebd400a060386e0813d805efac0132ad750c63348
SHA512e0797cd21f09234667fd9a73170c27986801bbf44301192f54b7a7baa9f7b552669c4fb45b17eb42fa2fd0c6c0ff40a7389de5c5ad64d79da8029b95af3641f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f6cff228e1d083817248b46f9b3b6634
SHA16142f2fb73f5e25f909533a45bc55ff6e096aa97
SHA256116497113bf0b0a2bc15b2211158af2b1290653a48751eed5902ed7d7a6d2f07
SHA512487da844421a0b9f43933bd532144a08f42c1263caab0e94032c008232e0e3359253d290352e12897f7fec97800211660dc8dfe7a6f564fc939c5bff10a5a36b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5213f05c7e736449bea06b1a3bd9eb4ed
SHA1565de053eca8c16878b8a2b143d7794b1c01e395
SHA2565b54b69bb06abc34efe57d32dafe7b4d268812d01929f17981f311554d056f51
SHA51239a1dc8ffdad9436aa9ad678e7afcbdfbd684e20bfa005b8506f6cde086e754e7a79f2de15b74af4c3e1a73b92773487f8965ca4b8715d306b58b705cc0b42b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD580d743f9dcfeb5bb553ec5d4826b2c90
SHA1ea557e07bab29409bef8814ef92a85c1028351c8
SHA256284e7f271a227efa41fdde0917a11e3d0004fee81aad2421aa8ed8928972e509
SHA512846753988f81c9e2fd0c6b148c3061b1323748f09a55a85275322354201d1e9f7bc5ed4228045e97fa2a859bc3e24407968c6535c8376eb63aeca94e7a402f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ab3340274a54094b0bb7197044b26bd7
SHA11fe72b443962f321e362489b250030781981923f
SHA2568a114d4e7e62f2e1b7398415fa86cdf69465cd11420c49efd6beb13b2faf179d
SHA512b132029b46f07446ee773377819935055f1079e2528a040998f35e74b007851f072668483e8e6338780ef8da342580862242165e514708318c8783e7f13ba66a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e15c39dedc57fb6238e6d2a44e274ebb
SHA1edb6b9e8c298c39196f058a8bbef27417b6682c7
SHA25666d3961c72e9330cbca7123d7a18505edccdd8c746bba8ba357dc933a7496a1e
SHA51282ad8658aa693ca247255776932f97fea0ee5007d8a9811e478ba5a7233fd6fd109dd51f16b7956ceb99b8d0cd617bc6d4caeb4350edbedbd6f6bcbe19d1f5e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573a01047c263a028286b8035ba153f7c
SHA1ccdd3dffa8518e1cd2f5cbb2d3e027ba2ca45b1e
SHA256da2ba9b042841bc4e147af0e1955dfefc5e4f8dad2fa65493df43f53b6cd6f9a
SHA5122103011d16f564faba500202b3deab5b0cb7a98b56674c903bc39f8f8c6489b5d85b4d371810dd076ad2c9c8980291e633da660f62d743a8b9ab43f213954746
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b