Analysis
-
max time kernel
91s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
8382a122c4ae5e006f94368cf29378bf_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8382a122c4ae5e006f94368cf29378bf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8382a122c4ae5e006f94368cf29378bf_JaffaCakes118.html
-
Size
27KB
-
MD5
8382a122c4ae5e006f94368cf29378bf
-
SHA1
b3b6ae2928c5aa071830bc1fdc164036270e2503
-
SHA256
f93e32ea3401c3da7bc5db80c239357b1f004f5aaa3668907cde6299e7a6dddd
-
SHA512
cdfe59ac7487912297f46435fb77929320842b35bcf75868861733dad79c5ff974b571b379d1cc87e6aa93cf8191342b862f81c82b99c43f08dda61041e25c2c
-
SSDEEP
384:x53H8mf53H8mf53H8mKZfQSfjzPtHwWwTwBTZ:x538W538W538lBfjzPdwWwTwB9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429398453" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000bb1af2f65e1cba42193a1a486ead23500d8c48c7ce142ba30684999d1c390c10000000000e8000000002000020000000e4f022e0d0c02ca6b1c1a8d72894e9a87f749a25324eb5fa0ab621a388e6b0d7200000009735c8e4fda642011be0ba8620a86b3d25c37eedbbb0f08ee2bd7823b06f5ae240000000e59f739488d07208d7f72dd8aea9706dd962f9c165bef2fb2277cfff1176b1021f9fad01090cbe2fa95755c1b8392824d2364bceb5e7af70d61254acaf85fc47 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f033bbc09deada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E96B4F11-5690-11EF-A4A7-66E045FF78A1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2680 2636 iexplore.exe 30 PID 2636 wrote to memory of 2680 2636 iexplore.exe 30 PID 2636 wrote to memory of 2680 2636 iexplore.exe 30 PID 2636 wrote to memory of 2680 2636 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8382a122c4ae5e006f94368cf29378bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99963bab0ebc42a5dfd738c0db85f31
SHA16498e1aa4b7ab0f588d2c07ea8cd851869a8b4fe
SHA256cf61f5f28bc2ed364d258616379e67d3d46f6d66006898326c8cf1ffedece595
SHA512f394525dbd00b45ff2a5f149a0715c6bb6df3649e4a9c28e19ba54c7ea3e364f286ed5db4545dae8591f56e04a05e310536f881d8176dae0fdd9b5a3c8f02fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f951f7f8228690aa7cf8bdfbb47dc3d
SHA185f50ebc8344434af63f8023a1d93f5e9d9d11d2
SHA2568dc411818db4f8eba51ed3fc2b0857de0c32eb78e504355091f2470c2db5b2e9
SHA51288b96e8bba12d050df74805e1cb8d6df7761741cb92d88fc5239d841dfe2adb1974a9f7d8c46808120529ccafba8c088c15045946a1311a8502f1e89bbdb8b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a797d9eefe0a59eca5fc927eb13230
SHA127ce2603117780a410dd79281fff44a8f2f38dae
SHA2565691cb60514a55211f941eae5bade363cab2d60e4e077edc7eb74515d5349ad7
SHA5124dc73178905084485ebc1533d51e0b573bda285e9f1ac52150b9aeb7c767007962d629f7831237e8893895a6940443c511277d4ac4aac2bda8cc892e1d63e541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff155edeb59da2a2ebbc6d10b1f74605
SHA136b92f0e44e99dab4ca967db68ab9f8819cbc16f
SHA25613ae4926cb380c1ab39b91c240a81913c1eb7ee262ffdac93b351abf4d2d40e0
SHA512ac1ce01eff773e78ad92a44cc0875f50ad5eb6e847ea73efd824af6e6a09f921fb21efbe3bb7e47b2cf59b5c1a0f45752fd5663b7283d7cb689da262cbc1e701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0045b9514b7c51b5b719079938e9071
SHA1b46de00f3355acd9833e8898b0e451ed82e8709c
SHA2565ac3d7f3b922c550f59e0eb14f037327189ede568ae7505a86a08016c9d47110
SHA512d9f33f4bd87fa54658b16e368ab8552068b8a970ce6dea9cabd516d66c2b525ff88f592a7a803da40655cdcfc4c0e18d59261cb9d682616970e76cd9c1b098c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f7d55ab6cfcb6ff8817228c57cd62f2
SHA1278cb0ec7b88bdc89550f4e6200bc61bab2715ee
SHA25649eb178ab5b3e3f09f5d9d30fc60727d40a92e409a62b68ca68c6be1bce3e03f
SHA512989de9c513c764252d31980f32665254bb3a58d212b224cb8e66e312094840824d8c817343683e18fae74b0c0bf29ffb16bfb09ba6e5ad914263cdbdff3faacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a51dea40a89fba77f551f8b36b2c31
SHA1e6fbb216829641bf6d0d185ecab5ddfa67e497eb
SHA2560b46798a5fc7450089b71c4f045c1e42318c2fae721519f677276faca4dfb830
SHA512cd2820a08bc5df1127c6404d93b25d42a08c86ae24669e4dd12039b5719ff55ff427bd9c98fd3472bdcf3aee4a34adc533fd47c2fc333b84c18fdf2f20d3011c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ddc01ae422321e748918603f00585fd
SHA1c847c38d08a849f0c72655b4aaac26b9f41bc9e9
SHA2567d9c982403ec9de26349b684eb25c036d6d59a457ebf1671db6ef2ec281bfcc9
SHA51245dc55dc1ce994d305a3384a8fb78b3c3237124feb0615642c9eaea69b60042ebebe3f1c486af8220c000b9308ae39a64b4bcf132d1fcdff84041705904fd8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e09add97725c60746f0b20392fd1183c
SHA10e382030954c7f39c43566a1cb4087e02f0657c6
SHA25660e3f93b286e9720e6ce9ef3ff794ff4200a3598d5a89cb87d668f04183677da
SHA5129ad942f6922944bbb1c420c66c7acf98a8deade0ece73e956d95eedfa3d8166c4db4f004e938f4a95c71e147e0769f918c53b794ade5315a047a1f72c396a366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e726d9d76a54dfb66c1f5726b343a169
SHA15328757038c34d90b85eb1c7752afd04e065b5f2
SHA25634fb5468d9a2e41de8ccb0ca5c7d4576fbdfde93eb76f9b5f283eb7fa0bb85c2
SHA5120da7fe79daf66809efcdbb7647a50ef3469ff88d32b0107be7648591db852d7ef987cbcbcc5f49c4eff79d900b9f4f44fbac99a077a2c46e1aea7f408125aacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567826acb06cf65be47c97ffab4238762
SHA1d7cb9cc7b70f3520b404337fddd82d4fef67d3c0
SHA256b7f2b09a6a8ac74d9bb9f82c0dbc43c95a3f32fe38370f7ec8155afa7a860aee
SHA5127cc8ab6a51a24584ffce9b83d0e184457ea2a3cd8107f3d0792e395071ddeebbc06d640ede36f897ec3e4573325b31a2bd5452eb7d85e5bdb76f96d6219d04d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed9e4ab4f7362606d39215f60025575
SHA192eb4fd147545887240bef491fe702a003c24fc3
SHA25695b7d91951a2790ba726fdbee533ccec0b6d369bf0c3c818357fd4db4492512f
SHA51271f15c8b57a61a130234fcb79d4477d1e76e763419ac0b08cda4c45afa7f696b31b452998ae6180237970d4b52617a7ef31fbb2feba2d45539e0e4f53764b00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f85ad2256bb2799603ac2f0dd857b050
SHA1747fb503085c9aacc4fb1c1cd4a14d5de84ecde7
SHA25666ef5f427e643546af20cacf2dd27e31b74ab535720628e87d320a84614dd6bc
SHA51285b733d3b230510cbb1ccf646ce5cd88b27c0a49e4ebda2ec731e78d5bb6e7bb537c1309d03e328cde3dee73af3560d828208a7f93859e4f93821c21f4774b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ffd10cb7133ac1789b98d5c378cff7
SHA1548e903e3d9911d28eff66aa2b0d5df9ebcb9a1e
SHA25612eec6d8629f5490b0207200ceec2a23cab3e548463b26cb5d323287ec00546c
SHA512432cbc117acb0f86d3a9a6b8175cbdec9748dbc394bd5fa604ae90729d942cae6b11d5c0fc17ab483594ff6f940c8700c68e8818cbd056292904191e448deb2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534fbd1156583d982a8a128d17fdfcc56
SHA19d59f0cc4712dc9eb4519f06342feb2f3068e3cd
SHA2563ec1f1b5077a66760dd853747402f3fb599847a83750d587b87210b6f4bd52b8
SHA5126c52db9db1cc6e2e843b4b80128704c8834c0768bcd891467d3233c3af655d26c92729b668874de13532d560745e0be34bc9b22730d7848a8d70bf4aa407edce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbaf60da449dff75daa828b5047bc41f
SHA178e562fe2759e6f3f5b5197ff3c52442769fec69
SHA256c04f4e627aad97aedb7fbf9ec59c390accd8192827b13983d153d5dc438871e0
SHA5126460446ffdcd4ba6ab98b0d09f1d331d2b6ee3f55bd050807f676a3e1cc0066c71ef1848c160fe0249840faa50ce0d766126e3ae074097672b5624a489f40cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597979b44eac11d512073a23b4097c99e
SHA19532d505cb8557ed832e3e42c1fd25afe092a077
SHA2561ad602e79a91d012a335f4b0d81b619f118ecc2ae515b164fe0ac451cf33ccf7
SHA5124f16ac886cffeb777a4bada2101f12050cc5b4d3d2dce4d186e2e52579e3f5e7a2529b2feb44f41cbcee92bce847054925bb004b3c28eb429e544c0af0d94004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53faafaf0958bddc57e6f54f1b6862e0f
SHA14189d12bb198540b819058ec06a1bd9090b992e7
SHA256a4a54c587028307e65939d02ee71c61074289c8e783503f7bd5fc1607bb4bcac
SHA5122abe9916832163020f008858740e4c55c14436f0e8a052f33c096c32736c736f63b1445f13cba9b015acc7977e2367f10b5766a107c18afb76f5fe693c23b91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57114808b37e732ada350ae3dca67b8b6
SHA1960736c401055b58ac0face67907b88a4716747d
SHA2560df274afb8b28a9b753f3959549ed4523aa94a7e28189381077657d8616ee27c
SHA512d9c48e0ec5f1be1016b0938b986a7676bb10c894bf110e767fcc49ed51007bde4e765b912339528415399f850bcf1e0c616352345af2ad27b9d39108e86eb362
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b