Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
8281b6b6a841411fe2afffdd0813e827_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8281b6b6a841411fe2afffdd0813e827_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
8281b6b6a841411fe2afffdd0813e827_JaffaCakes118.html
-
Size
11KB
-
MD5
8281b6b6a841411fe2afffdd0813e827
-
SHA1
10bdb9c84ad30eae6b530e2942dd319508a7425a
-
SHA256
feea29a79ef32ce09acf6fc6e0344429615c4c9cbc66cbb77874af2c6e5e19ac
-
SHA512
80fbc0812723ca127c37031091074fde212e7a5dc75747b3b017aa644586ad31de555d44b445a811d24c9e27750e868e043893d62990cb74d78836b0c9d23157
-
SSDEEP
192:LuYGgtyOfNCe1CZdv/QM9R+0i+I7yefWxyha0Gi2bi/4+uCKnDO8IqPyt1:LuYGuy0pcZdv7di+lywi/4+uCek1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428723849" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000008f1c3c34320ea3ad06aad1291992b4f9eb29ada56b26a5788463e6d42b9d42a7000000000e800000000200002000000021b8ec1d82b02bbe6b0532d0ae15034b0a57ab5ea7572e404fd8175f422d301a20000000ec072932211b92098a213e288ea347ae0ca9a3aef37b7f6a4f19013cfc776a0c40000000d18344ace689c9c8fd98c87cb8aedcb14412f8e122b2eb1e9676b3e428abbbd3d2c0a0764e9fda6256feab2179580996b571dc5266c4748d38ca62caf34c15d5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803a910e7be4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A1E65B1-506E-11EF-BB94-CE397B957442} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2780 2200 iexplore.exe 30 PID 2200 wrote to memory of 2780 2200 iexplore.exe 30 PID 2200 wrote to memory of 2780 2200 iexplore.exe 30 PID 2200 wrote to memory of 2780 2200 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8281b6b6a841411fe2afffdd0813e827_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5766226f8f83ef8eb25e59a6c6b86ec14
SHA1fe1a550e43f9ddd2a483e2bae6f9c2cc6a19d6be
SHA256058a32ec8ec21fc5291c70a7ddb24666eb38ac403654f6764793977af98dbde5
SHA5124bfee99d4c4dc2145b073a3c17fbf6fbb101ee8c96a1cfbadaf51e0934a1e535876ed26cb96022c1077461858c76cac4db63ff67461f1e8d10e27fab619565a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c3bfe80e31ee0b298e0c3dc548659aa
SHA139cd0938431889260d267511d3602aa9c078b385
SHA256c1b27fe2c63ddcb10ab00862ae29919a14a7ac6d414b18b3c3e77368a6db1f33
SHA512890df6701a38786dfc69982d470ac4a173c33c2d65066cb0244df8239c2368de87de0c24dcc99b809631d0a564cb0199212ac4ef4b4189e265c30daf0c37ace3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d35fa103a6bd5865cc0f31c3bde27292
SHA1e865f2c157a66f009e568991be6ab83451d8fffa
SHA256f85a43062cc606e345ad771c87355b7c862c572da522eb54315e45cf11a68d46
SHA51200dfc5c213c67df36b668d1304abbc0d519626878ff6bf978b3c2078996a20f71953fd5a061bf170db24710082089f3dc21ac92126d52dc7f88515f35472aee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac3b8515dd1ac145801eca8309c0d7e4
SHA180b9c67b2b66ba2d2a6fe843ef25dff5759f7359
SHA256458735cb8a26c43a4d2ef6c860fb77fc83b73f2614ec88994dac099170d392f4
SHA5121a19a6ca15d7da86f10e4181004986a9e9bef6be9285be13be8ecf2a28ced850ced83790cd048fabf1c55f217b51c91e9fc55d7f37fb37cff643cd9c400885cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb56402fbe650df1ce1b18093613c65
SHA1371adffb05041ad951c254311c74c0b3fb8598ba
SHA256388568b929e7473d4bd96e755d76c1e3494a8f24d3af8798485b9bd97f804275
SHA512fd6cf307af9303702e938f790b44fd647bdafa3c71be7d0ff0a45ac4ac36698bb33a3d05f49dabcb37a597e3241c68bf2728b99eef028b72876f77213f33bf14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5997fdca237c2422e8b45ad471cc7a008
SHA1f4cebc4d03f100024aa683aa236d9aea033f8adf
SHA256b94cef77e98540bd3e12da1e6caa0e373beda9379e2202160c2e8963ee7aa413
SHA5125d0d8d55833e7ca4e5ba1cd38e52ef42a3d29263198c7bfce4bfd5a9cb97c5823c0da4a0cd46f9d5d02b69da9c06456c9bdeb494dfaec7c3673dc1b5381b0e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd3e497d46f52175b59c41daebf1db8
SHA1a985675922732376a0623cd5c3b875b064958be9
SHA25672ab7b241bba4510fd910f5c6788ddcedd25cc4711a035615aafa7499c6c88c2
SHA51288e4d4e63670b0caca4efa79b272016888894dcde5e6fb9c255288ac46819a86a817fed9750bc89010990a8bbfeac29db49545353ffb5b0adc1b11d8fa5c0a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9174b57b8df567dda2c24dd6cd7831
SHA12004da43abaa48e9ede6e6122aa62a379a7ad998
SHA256bb3c967cff73ae717c96f4dec7880018a20d445980e85822b8f51fd9b4c8f4b3
SHA51270db682f8509b7e8c8c3285b8c22bd000022965152478e0777b899d6e8bb6b214e60a24189b62a01bf9240f5b6ff711862d00b5afd1dd2d2a37f4ea78b69e807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91b282b7ec5850b9d98975c75451390
SHA1c105170512a1ee1c13094d5734f9d6646400db04
SHA256ca3ee0d8e8fa50b2f581a6ecee03c384ad7c347dc8b86ca6f69a612b272378b3
SHA512eaadf39f4c5d19aff8ceb2d7517d4fc174e001f6d5f80603e721a289ce012dce8c969e826cda3806f7cef310bea368a86e5d293e8f0e9c662cf820c2a055c192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f668241478bb46d74d59791c702a2fa5
SHA12b5e0144ee03059a588fd2dab01ae46806f70220
SHA2567b3ad8ddb4b9c952d6016cef53310b999ca25040189c85d0b8c6e1aa996956b5
SHA512164c140d38f03208939b8705519e5f7a82315471000e9207f3d68daa91360c2afcb9d48e4ebad6cfdab11d5eb79dca92b68393b85cb7a39810e33f3808b47cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43f4cc16421a3d183670feff396a3ab
SHA1b9c53da9406e9d39cd0511b5abb99bde97e4917e
SHA256d838bd96fa6782b0dfe43ce0d57dc71af5afd353d23e6cd9acb9826ad9bdcbe4
SHA512f8eebea83df9e99c3f1129b50fb44fa6d6040388ea325d17dbbe2dc3799608e1541314fccb7c2db100a9d1f9e7e3220d0c683dd71308bc444f950ad92bd5b7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351fa6dbf8980c2235fffc8dcda03c68
SHA19e42fcd30ba03993b3ef224ed82439e25c932710
SHA2564a493ae489cf3d4987749ff2f98b9ef361dfd647778ffb6a7796835e91c2cccf
SHA51236e368e46b12fe7b9196405d3984999d8f16cb85ad25bc39d7f1807dcc37ccfbb53a957616268b03bc602bd03f5488592002f4d2e0ecade5690295afbbb8dda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ed8fc31ed628e1e94760c29ef94f00
SHA1e1b22d8cf7ad92b8ddc09950419f43769dbed146
SHA2567b87706faf7d6eb458ecaadc90152261bdaa4dc6248b65f3892acb351404eb47
SHA51275af8ada130837de7d510b860256af9b4e8fa4d280bee0c7e89d17da69c45bb8240bbc7f3a4171bcad053073e21409c080118fd8eb75fe98dc6542c7519544c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c62afe1742a0aa7279c0161b224a380c
SHA106a118ef4dd9afdfdcd2563c8c088a24d53bfef7
SHA256e7ddde442be49d8609986605281c4ef055c898dbd00b7648277963a6c2afd8ad
SHA512698783b74ca34b63633046446e267d2d2708face6f6e73f74dc94ed6c315072d1078882adb852111480d049ebd77dcac82393a21603fefc7d6f5b19728625f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f529f1c8cc830bff6be371cee58fda
SHA1aba85013c96a0114167959cc1798cc50dc2cdb86
SHA25642b19f725d9207b31dd3609fbf62324ba13d9798c61bc3fb39ec384e2f6f245a
SHA5120f71c1f6ac7f5e7126f2a27bd97b3799f5cdda35f891f40f091adf8c109a41829f8ac13813f56c72be886a0b52b37241017949dc63cd108d4711a0e7b610a3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568fcb7635c3a1ad251a2939cafd8cb0b
SHA1ebd84747279e743897de93082db0c8f9e6d7bc1d
SHA256c3480cbe96449a2ec078a6713cc2253166df0d596035703462a1cf115337ca86
SHA51231b5903629ea3010c77bf70b1ec2f224cdc627b3a723d1868254fe022c41ee3e0f9b6a9838777272d835a58e3a57030143bd787e2f93ce29bafa26b8cc6f4eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f95214473e81b5d6482447a24d1fa56b
SHA11bf3979b0edfc846a5821897132145aedc3a3980
SHA256ee0e3b253c2a9aa77940005ab7ca75704c58c20fc2cf1f23b3a04f29ad198d0f
SHA512d8dd68041c02596e74800eadd3d94470a18f3c1451c398682861911e280f0461ffaad20a057aff16b1772898b712eeb9d362d1b38d2f08a7ecb2cd606dd5e8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50150db858326258cd623726597a58a33
SHA1a2db49cac2a1c7b57ce40a8683f354c5bd10cda6
SHA25689403acaedef69a297b12cd909081e694c80321eadb104a415456065058a5352
SHA512918f3ef5425b786804aa6e700ca78029b7d4f682b7f78859683d868c88f3e0ab4d4f078dd6f824da319faaea675a32fc3b28460891af0aec4bd3a6a6546c5b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb48c51c332a29d20cc8004f90cb31e5
SHA186db7576aa9726286cfa199c5950aafd4467d9fc
SHA2560cdaa21c0946f66ccd2ae87360158ab7f9f51cee5eaa16bab2a597990240625d
SHA5123885a229ba8ae3522e30a8c0820e8a37de621b99c86d21ef99be66982de8bc7895e10a20c2a00156ffbe13c7874d8aaa907c45dc2b6f48412bacb0b716b54ab1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b