Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 23:07
Static task
static1
Behavioral task
behavioral1
Sample
83ea080f59f3cde66f95ea9ae9c6a889_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
83ea080f59f3cde66f95ea9ae9c6a889_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
83ea080f59f3cde66f95ea9ae9c6a889_JaffaCakes118.html
-
Size
9KB
-
MD5
83ea080f59f3cde66f95ea9ae9c6a889
-
SHA1
699033b09742af403f35f89bf6051e7103eda1cb
-
SHA256
91418ab4dfb1fe2d78b0ee9ed73e006295676931da54bc9ef18327d1b4815067
-
SHA512
6e139899e67b5c5b39d0d911121d986e4a4cc64cf25210b764f35355c9d80d1a914d49cb5238df99f6ab4f80530865e4c697030944e3f4f6303b4d896ef136ee
-
SSDEEP
96:uzVs+ux7Gx0LLY1k9o84d12ef7CSTUszfJi2NF+KyhgV+Uhdphb+h8cqkOJfmeOY:csz7Gx0AYS/2N6pcvqwEgb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D9CB811-56A4-11EF-A550-D692ACB8436A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429406702" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80112ff4b0eada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000629387281cff38813f24d7511a1c9506766356d7c710c36950ba1ae6ccc00820000000000e8000000002000020000000222defc4d1ea158f393c6769351b6b6195e9833a697849b76fc46cb5137266d020000000a2c665196c42f6fdc87a54b0cdeb723d5cc3b40db2292d2a88495c9d9f1be44140000000dfacfd3568a796d2ccca06d632ecfe4bb80036c7397bfcd5eccb88867030b7b1d089191c6891c1815e18da855484565cbd39488532026a095fa864c868f04d8d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 292 IEXPLORE.EXE 292 IEXPLORE.EXE 292 IEXPLORE.EXE 292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 292 1736 iexplore.exe 31 PID 1736 wrote to memory of 292 1736 iexplore.exe 31 PID 1736 wrote to memory of 292 1736 iexplore.exe 31 PID 1736 wrote to memory of 292 1736 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\83ea080f59f3cde66f95ea9ae9c6a889_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5695c4de85d8a4650133d2297dbdb5a54
SHA19eb924f28c6e2b56bc8ffa1775349334153d31dc
SHA25670333f2ea787043c8dc3feae63b2ceefef43b286eed6f809ccc32da0f298abcd
SHA51206149ac7c39ded9764d26e303767b56eedcc2ae36ebdeb56ce1b6192511c01a4a4bde04c7661818f6ad807fb049dc70a71a9d2cfed46b8e52d65950defc1a24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5920f60099c7a1cacb819912cc36311d8
SHA19a4730d59be8d525836fd589785eb8ee8882d75b
SHA2561b324a1bc01673371aa8491f8e6c3d5181f0d88a5edee835b94b05582a90cf62
SHA512c24bae383bf4a6dcacdee694bd4bd65e7b5f629e8450620f8ef861db85ce71ac6258e990a0b5da95e978d4d2d3541c1662fdb9fa1e409ef1bcba088769ad7cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e10a1679787794360a1d0720a624f710
SHA1fdc4661eec1dd00a5627ee5f033d9a1cd5938ab6
SHA256c175d8a896bddbcbd46733c499de9626fee75e2ec5d50158195736a7357db709
SHA512883d5fc0149ca05a4f1bbb6d8b5790ce0543db07409e92b741cfa26e13977e0a5cf51c003eb4142e44daf433231c28a0bc6eeafdc305fe2db18c45a02d237874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53bb62e1d02ed98bd87b9417d6f1d2b07
SHA186f76daa013093f6501b54b9957c4f67eb43476c
SHA2565df201d8c8ff59dbb3679ad4ebbc58e86497407af17697ccbbe7e4fbefd58006
SHA512e8360af22caf0bd1476fe0ac6467bff35ad771463e23c04f3a5ab431ef9e8270766c61a32e88b793fdccbe249ecada3c11bf213170841c3ece64e2f9d4bb6577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf320bfe8dea0b424990770f17a062a6
SHA143f9fb4a2178e8e8e4f2cffebbc74cf6a51569d1
SHA256a7cd10da00e8da9a77c22f572e658782f2d40006d8dce486195af202dd1648b0
SHA5128752d7003c74d1b42a1ea25ef5c8eca909b212bdf674a6cac9e3c8f3e20e8c6e5965a256460e6057184ca679efd214bffaf2ccc8ac7f4bd77e24b93457f26bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f91d03f6c9d660311e3c56f36c7bc491
SHA1b0f41f0aa441feeef602440e3828345feed9fd54
SHA256dcd03c7dda4c4b8557cab40703bcc0955948da1dcd903005503092f8142d3010
SHA51266c97b51f86034abb67a502126c491bd67763c85a411efd857b27f99070143924d6631001180b3fa83a1cad528cce3e08d6509b924a96c35ad1931d1bf6316d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f032ceff5b17a23c4a0e4c158ef9ba8f
SHA16afc6db6fe3f05cdc53a89c7a7574b720b64ffc2
SHA25664a411dd2922ecc6779dffc3b4a8a2afc57f42aa3d887ef33bab943387b32556
SHA5122611d4f0b9fa27cd1d4517386899dd6c66a6e69ce5838fb9e6118a44d7758370847d951b5cc73bba57e7a439709278fb58e241669ab13cbb2a17b2786ff2b200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD582375b16d843fead446155a9063768f6
SHA1464faf5d5e709f918d412bcc4cb3bf6572466e5a
SHA256aa833621966c3fbee7b7026de1335c4a9dfccb86e22c68ec59bdaba610abb8c2
SHA51246cefd18dc73882303f426d95d1c8c28525900aef3049c28cfc67c71439fb7db9808ad4fb6fa057f6e2fcc04ac6fdefdf1a73ef91ead9e5663095c0589969841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD577e1fffeb610df9d3d6b2116d6069582
SHA1ac9f25075c8249dd1b22d520c1849ffa1d8aac9b
SHA25670d6707563863cbd826ffd5c75d83ebf0547cf109b4491d253d6d552488ec385
SHA512ca7f4f91e9ca876a937c0a4aab0e55cd04087a690047c530cbaf379209c62e2b9a7c12fc4cd109468f31574531ed9907f62558d0699ad784b90ad1308da2d451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b766b65b1d7285b02a0e5c72e228621a
SHA192e385d41d64466f2df41377eab4935005475676
SHA2563694524d76892defc57a537c97be4ef9b67470ecbea0640059786077f73d685c
SHA512ac6cd8ee779bdb953cb1783ae963c327a2eabf08f52ef81421c5836029006029c99590365bc6cee33061dc10ece4b2637cbc71111112dc91d77eca890f19e85e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50d303761a410ffc6c3aadf8bcdcec867
SHA1e2fc7f630defd59db03095240135970d2256852e
SHA2564a5fad2b978debdad92a5e0980b26c8696443c89664c7875a266b79e3ef3de47
SHA512a5fb17244c9003674d4f94dedf9ad5916fb2a720722c9f22a792e450ffd68240aad896eb93947636fc4835996ad715fbdf0ad478cc0a4ccf21da5d0f813bbd8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52dec3cbd9ed4025b6d9df15a56eac303
SHA17af18e70afda8ba84a9678a8fc4ada3d9f8234fe
SHA2566831544cb558fec0709a5e8b58fdc595c005b51a18e699febc99d2f4d434a697
SHA512970c58ee140fa9767d61e1e2e12b6ab17c5c26f10aaac0efc163bc54adaa8a4640ab821a94cd5cee592e0664f72b0262d6295de2d24a7ecae68025928cf09a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD596b7e24088fe635252902f85c09e319f
SHA19013a946d0ecb1a3a589e96ee759503fd489a463
SHA256e2e6d11f85e79b14ef30bb959a887f046de78cc931a83b87683ce9b9bcd7a780
SHA512811917fc8b2ac1eb3fc1c696667c56b175671f14d10ebbee03d44b78f72692b2496cec55efed0fc2dd763b0a62602ab248b19a510553ed19923e07a51c74d880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5656a7669790c8c7a5876f4ffab91c3d9
SHA1b670aca849e357accb2403e8331fe1226ddce201
SHA25671579a693f364844beca319098364f4760286ad3a6055e34e463e6fcec794f8d
SHA512f0cf7e28669875db20a7e4e320a57d4813546379d973ba043125eafe998d445e40be5ee133d1a107756a990f006be698dbecf0f2d6a759ca3d1fc7a9fba5762e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50e813d00a603864b80ff7acfc801b9b6
SHA11f60357eecd5df0b1d7aa9290142dac85d0bb61f
SHA2562b263a576fa5e3d32aa32cfcc1c8f472742d0d57173e999bec3d9cba3c7aa47c
SHA5129805ee3d804a4e767f549d8a0e846604a8aa7c99e22e3b14e70aea63a61a0ad3337d3df485ec948a69fa429e7fd22ad457c878bb3d9a7b89b11811c87b766157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d055a196041ea5b7b292520e2a74d76
SHA15bfaaa6dfa05f7342894b31dcc9c836a13b767dd
SHA256a44e3515bcef9bb79287b9a6ce45e464c50fcf736490c999983d1fdfa3987b20
SHA5126c6d0ba811e9cb5e5ff714b1e709a487c36f1a4107ab12d1496e3bf09e1bd99bf542376d218534cfe6a0614eddf7ac1994711d6f6ed70e2d3d083aa297f749f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d11a4ec6a44aeedf62dc4972cbe4081f
SHA1e814aa87e18541e486ea97f502f7b6dd417166f5
SHA256d6369a82b77cf5c814b7947c06eee373241fb535eb6821dbb4c8f76b140a52bf
SHA5125e3e573d3a6648a702c3ede5153c260a3f42627ec858693f1fc4b4089524f4a23da44d5c4be356104f14586b05458ce34bf46551ebb7d81603c49f543b2a0532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51f6f0af9cadbd4b31e9ebb877998ecc4
SHA11ddb7e71f822b736ef08cea980aad4882363e0d6
SHA256cafca86a76c9c02350eeb6a5ede15bf3da197343b0f4c6a84b45b5bf0841777a
SHA5127061f2eeed6e97a4714335713c2750d7159abb6f1c0ad9109c140982b6a3ea2ebbf2fada4dfd699d59da3ea35f1aeec0a764dc6514c8a893a49fd5e9ae7c3792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c8994852525348c0bfeb7dd49c3af18e
SHA1f3d188893e6290f628ba235fd1d8bc858d328021
SHA256b898f1b6684ed4a8835bb215406844108a14a23e587ff56a0eb88c23c2b6372f
SHA512e9b98d1e0ce39f5203dea8ecba2577e799cfad9cf27e8221600242088b39553fc77326cabcd39a6c2193e476569a9063b739adf703ff97369cfc5cb643685b62
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b