Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
8377200766f7679a5f07e776f8714771_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8377200766f7679a5f07e776f8714771_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8377200766f7679a5f07e776f8714771_JaffaCakes118.html
-
Size
53KB
-
MD5
8377200766f7679a5f07e776f8714771
-
SHA1
df4c17c0e18f3f36447673684f2fa38044448d17
-
SHA256
47bdf7e978cc70f3952e673cb95a4de846d89e64ab6ac3bdf4182baba314dcfb
-
SHA512
eb91cb6ec8531e0c9c1da14a367eac34733c32d1e785c1e665a47c144b571db8b705026e6b61d16311aa9138a0f98a7cf20c521d1d3dc3cc59fa22e53fb3097c
-
SSDEEP
1536:CkgUiIakTqGivi+PyUOrunlY/63Nj+q5VyvR0w2AzTICbbjoY/t9M/dNwIUEDmDz:CkgUiIakTqGivi+PyUOrunlY/63Nj+qs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fd35db9beada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{056584D1-568F-11EF-B82A-724B7A5D7CD6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000c6f30ecf6f8b285e149ee0569fe2b950969bfefa2fabcfb4c6ef2a0fe6cc6023000000000e80000000020000200000002c1e1bf5cb83fa2e6560cfeab3253a4d640daa7182484b0b3960424ad1df32382000000026b2ea98162b3b595c633af608a36e23e817a7f4a962f39afbdd199d4507866f400000007566f3825ef4aa94a6dffe7568e0c906feda6ec7e7d0fcd46e2f17ac760f42b28fe665b25fc949e6043e9ca98e9f69f689882d174122a89d8ce8b628b152a3e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429397643" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 372 IEXPLORE.EXE 372 IEXPLORE.EXE 372 IEXPLORE.EXE 372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 372 2364 iexplore.exe 29 PID 2364 wrote to memory of 372 2364 iexplore.exe 29 PID 2364 wrote to memory of 372 2364 iexplore.exe 29 PID 2364 wrote to memory of 372 2364 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8377200766f7679a5f07e776f8714771_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc644bfb0dceb13d80ee48240c2bffc8
SHA14e26051fcecf440166fd83a69c4b9ebf213901b3
SHA25649a7fc540010306c1d82c257294e3291217d73509e1d6bc154f9d40c6472fc4a
SHA5129f7533f596489dbcd1d64627781d95b73eff09621e8efe4b5570fc2a5dafa5c88399f0cf834dc9ec4b898e060fa41a63fdeb03ad7e47716128f714c9248a2cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a3fcdbe42c45f18366f411f17d4147e
SHA1916eb409757f9b9ca448dd87b81ea768ca8d4455
SHA2563709bce81c496c95a9e5cde773e9f705f4ce1cfc8133db095b65d9eb19c1911c
SHA5121b99873d7acc456c35894d4a63cd514953d99aa2a6b1bd345a319f5cf2833b19f56e2c6df9e0b93cfa22ec60106b2205ae06f57923e31959b231aac3118cf8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ce1eca5e846e105d25058b86627efa
SHA152166577e9da98d7a56dbb641fd3e0326ddf2cbc
SHA256d77e6fb3d7ee4ed35bfd11406c2810754d0894ad0a9f6add7a498e1580376cae
SHA5125b619cd267927946b6a59602e23ec537037a4bfab4e5f463124e3e8b45dbf4fde63634b53e1db31ce1180229f5bcf920fff2bd0825e48f9ce6b995b5eef9aca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e751637adc6e728441985ec8a183037f
SHA10753c5d78223b1c0cb90faa11baf493c08155068
SHA25643fdef80b9af4cc94444e58294b235e5ef8a54862ab96cac218fbdac0a8237c3
SHA5126c3a60a9ed5f078962fa03e1418a1fbb86015667772a60ac67b4b4d60e7aed9262d48d5a0aa5fbd12c7f0a84549331700a1ad82ada431fa94ada078e7b43a593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a970a8a213528351d190752a19177e16
SHA1ab04e2cfbc86e700fefc6fe4985353aca2b6e3dc
SHA25660842373cbcc1c1784205b6142e6796d8acb6495b6ad188480f3a02066fde042
SHA512ab114515f47a213db96588fa1406d16a2550d9fa80ef8e8505f061be7ab789f1729d4bb5ffe8d294eab0d2ed95c7f27b5e9223d27a9be1bc88d65668abf813cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac26299d9f33e6738716b68734332c02
SHA1c939f2fc72649f264240c9bd41841ff7512ce04e
SHA256a411c30d4d769fdfc6a1faba2751b180142884ed6de851d08af92e04acc4e1ca
SHA5122659fb4a9b80a40667fc9fd5de71d959f145b5ddaec62965474448b1782e9e3f205e47708cd68322e8311368d1e61e1dade849ff61391ba0b9b5114c790c0866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271eadd17380e1f05e21d3b599ee3892
SHA1692da54ecc7e03904f72a4eb7898536be7f2c5ad
SHA256039e1214f6e8f48100c1e999440cf0f8508f92be142199ca142f87c88fe34aba
SHA512a3135d3047172e4b9ce53cb0c3e0102694b979be81ef8d55717d3b2f247506bc02838aee4ee4ab688d8e7c8d073d33c721a918558e1a7493fd031c4350017e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f4ec3bda73e07d9108151dcfd95aef9
SHA1de813c01d80cc21aa17ff3f2f93eec7677160713
SHA25612cb44f491b5416553d1b5a364eadf144fb0b0357a3dfc59ae088ae0836c443f
SHA51235c268b0e076afe89f3e5debee4f4e9bf11b47236b816ac67fd9de41c8bb3c2935a0d2ebaf790ebcce9a7c56422f80000ad63dd8eca8d9526f701c18a201b69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d097709e5a748508e5b9fd00124d07
SHA1e02fd1bd0bd17abb346224695bfdf983f6e1ad66
SHA256a4ae724ffe50e59e793f88805e0228ca74e9eb3f432e02b25c935bdff2c1c69d
SHA5128c5f93731390b88e2208ddacd29ee9ded1529c7606e65df482d9d847ba51d2337668a15e9f05bb162d15149b530d9310c48f53962ca3f7ba27b9011a8b9c6c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddc1c1e3faf272616ec5f7de408baf1e
SHA1bd2e1db349c178845be93e0bb4a4b7a16a8c713e
SHA256c98578f1cdfa93203434a325da052d3fd9b5e17a051c7e26383e17a79dee933e
SHA5129c6cdab9a9a5486e15ffc5ff6cda65ae012f9581b8840b2824f2190dcf2297024cd5402cc09edc60d43491708c5b7434ccbca8fe9e17df4c6bb564c346068b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3b644a9ff88a2e2c4c2174679293d7
SHA1bfa48dd224507af737cad4a7abd8be6c8f7f531a
SHA256095eb7199113f2b5c98d9315c3d661a9ac4a40cd82996e6bdf981fe6aa16228a
SHA512f3479176638ecbe46f756791c9fc86dbc0738033d65101f363216c5695cfe4b1d5bebd27033dfd1613d95e19739df36bc42a1c78289c86ad6ea2571a6b483e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585dae29869a986a77c47899bbabc9992
SHA14c41d197e69235f67ebc5082fec10b275db11086
SHA256b6e150e57ecc0e8615aedb54bc0a05825f6c1c59bd9cb0a4b16ec535af4bb685
SHA512e10ed67a814057afdf177ce4916b593f4c53ff46fd849b65cf127a3e816fbfd0647c9c5eecf1c4701352c9de8272fe31ae9eee7700a0761c6712635aeb8ea5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad9ebfbe3bdbdfe4e1fcdd9905d6c88
SHA17dea7ddc98201ad695b0f2a8d4c86d7668034089
SHA2560db3246cc199f782d16db8142e66c7ede9b9701f22df5f5197eb7d09af6d825c
SHA51208fac71ddc278dadafbb3eab338c366268297b345d6f47c44c9f3677d7237e1acd8e83ad60f58766afca7182f39a46d3c028346225f4f2cfdc7d53fbc2d8694c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55733edc401eb7c725f8284840c4c06e1
SHA1fcd7ac83bc821d4f4f1d665e427dec18387c3bc2
SHA25646768ae8ef7919611e689b2bc9ce1dc0f4c910d982985c30cd5e85b902a42d9f
SHA512c71114fb721b1db98dc295b374d44800c341c15aecef9b1058e5b6709b417dd7d537d6db17c9c420eee4b8408a38cb690cf384e431a6f519d15652dabcf994d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511f2037eea2bf9869e3e473e5894a006
SHA1fcd78dcd87a50896d8039d9a15a5686b6e0e9f33
SHA25648d023e010ed01f7845aa00c81d352ee97d0adcec1079375766e4cbb5cefd875
SHA51295506a42d8923405478f2477821fb7fde94365e7c975ce13fdc95cd5344269de545f0ec27261d84126128d51ef18f5b6457857cfff8bd21e7943962893fbbc7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b2746a8299a715e18eb0794548864b2
SHA165eabe8b9541f329700f0f856d4b024f83b08f70
SHA256728e0cfea9d1d3a3da8e7cca4b2e8c1edb83534a47f833f22f85701ff9ff87e5
SHA51243773d4e5b0d3f0fd227a2cd09a99c75129e1af77d3c3a1510b2d30c9ae702fc52f1e97b50883a6049b17d3a094611cde2d264dc3512134998524b136212aa4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507548ea86f9155e5bb97eee4f7431f26
SHA18f3e0cf39d839227cb31c9e22154f77b8cc22abc
SHA256f60a55e9fb34d7bc6d0bdd7e4c20ad7e2313f61219f9a4668acc9ab9db247fb1
SHA512d923ff49b548111fa60305c357d9f1bc489a3dec3a1dd04a1619486e882218c7fd2e1b7eefb52376f418e16df967a0edd08f1a0b5be96f66e0ec1c11f086ac8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe2795cb15e1248873140f8be7161ff
SHA10ff4e963480de814de0c672f8c684c66ec571d21
SHA256953d5650d1f10efeb2b646ee72354d8cd3d6f89a906af643887d28514ea0a5e0
SHA512026da31803979bb87dde802f55adbfb22500b41a75eca2af6fd5d3d4fc3f292d293f622def59389d04c4ef6e994b7ce97f42e7f0afd69c4e7069e506b349109f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b