Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 21:42
Static task
static1
Behavioral task
behavioral1
Sample
87c8db191ae09e6db338c3987bb55a57_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
87c8db191ae09e6db338c3987bb55a57_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
87c8db191ae09e6db338c3987bb55a57_JaffaCakes118.html
-
Size
19KB
-
MD5
87c8db191ae09e6db338c3987bb55a57
-
SHA1
12b20aeb3b76f9ffb35fdbfbeff2f038bd46dea5
-
SHA256
d3ebefd521a1712995e59c6469dbca1d365ea38321025bcdd1bf03a32c114b00
-
SHA512
fc1d9440574117c81894a493dd550c55401afe545f331a6cadb4cd404016048d4048ad52c44f959b937d69dd2be0c7570e79eef19f00f7ed88bf72e75ad5b584
-
SSDEEP
384:fxSV/l2/Nu2/NI2/Ne2/NHl2/Nu2/NI2/Ne2/Nil2/Nu2/NI2/Ne2/NWg:fM/AZ6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bcbc4f6eebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429488031" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79747C01-5761-11EF-8A2B-F235D470040A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000247c79d83cdf3b6b16dc535ea09bdddf54e4961d3f4d5b6b4d0407245067d52f000000000e8000000002000020000000c388c70c21d167afdcdee8406f5a1fad4abe066308f40d2c4a114c1c1735f3d220000000210c810cc2f5b0e603fa827eaaf146f13514cfeb1996d117b32628d92ae3ede9400000009db812ebc280d6190916eb2aa5e4c2120f40dc7ba2b1e4a0773953f3edf17ab6c655923a25bbf96181d1440ded66dde1a05e1b861979e7f7c1565e6300fb4559 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2456 3032 iexplore.exe 30 PID 3032 wrote to memory of 2456 3032 iexplore.exe 30 PID 3032 wrote to memory of 2456 3032 iexplore.exe 30 PID 3032 wrote to memory of 2456 3032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\87c8db191ae09e6db338c3987bb55a57_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac54929700ce5e011ce767c1cd7d09b2
SHA156537a25cf6a140a88db387d448f81271691d9e1
SHA256ef86ae8554d448b218c186c35cca61d6b70fa912c48ba7779c400f6f2d977280
SHA5126629471adc56e8ec7e4efea141334aef9b0515bc5c2f0519bd94f55a5ea7b409773cafc28e4b90561e8058433fd5846390aa9cbbe91738326c97232726971a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca9a585c47c23d16ca17c1de61b29631
SHA1e2712a3ac29d23d60f2068541fa5e9be192ec9f2
SHA256df22351cd81bc00c67f61e36918d9c6e16c76fb374af4ac2471390cda2efe0dd
SHA512a6424e515fee3a686ad8427965dded27797d37abdc7a0dfe6200ca7a1f3dae03d23c5b3333fc4992f61f91d759f003b4d6d67f62ab70a9acafc01d74bf522b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597275624f67986d11fd7a358a3655762
SHA1fd78d4cc3b0e83bf1937654dd4a70689807b8c40
SHA2568f28468373ef7ed9250fda2ad6647b2b5822776fda1333fd009194a000624b60
SHA5123cb859ae3b6985ed6471902033c66a04c2fcd48c74dde4641e5e1432fc885414a01ad26ecd03b2f9632ae6d2b122ea21447721c26e8b8305463e714195d30452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504b9557c37754234225611b43bd0dc90
SHA12ba32193bb2c0b19174214fe9482723b55135195
SHA2560d7f29d12cde8f6d09f26d144287ed2257179327a5e679e77a22fe4f3f75e427
SHA512fd9ea8bda710b83ae12884834f0a8cb2f7dcef5603dfb50c84c33b737a880cf38ef9ad261cecbf53d386828cb8267228e184e927874b08dcc1ef58cfeeb53b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510dee6669406c188a2e90b4cfb060c0f
SHA15b95a788b567b3eff347e646e853a6ad799f5765
SHA2560d3a4e293e9eb6b7ee30f5558cd036a814c5434e7d8ed1be1b9292627fd987ef
SHA51292d2a416f6463dc88d8ccd5a402934ba94ea99f71e2fb90b20b17232cba8dc6a22ef27743ed18745fd6bd1c4ca302d325d31e6bf6eb69b998f05f9a2b1a71e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d891dcf3bd4ea2a42634a962689114a
SHA19b215d48161c74bd6167f5f93b6e43f2e12b6455
SHA256875d081cdb43e850ff181ae9151ff663bc675848168ed2213395789f8093efea
SHA512e3457c222cd5aa979f76d7f36fe4fc8e1c2daf7d6b3700c268f1302b469d03e329a1d32ddbbf22d0efcbc9ebee5e6cb12fd372615c7b94586a1e351df1839032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9cf34a9465692691b0add4a742b5e6
SHA14f803fd386300ceab1a484858ecb713c3575e67b
SHA256ad12e9f515185eb85585ea0bf3749ff1ad2018a03c337735b4aa22b53f18f610
SHA5124befe786dc09735348543788ac8b38e333eb6ea2711aa4aa8b136546cda0ce19beb73e93f0d72dc47c55bce98a2ead52d692320f070308d61b725e5971745a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c11050cc872dcd47041f1f52fdad8a4f
SHA146d322dfb9ab770360bfd4d327693f1d1100c521
SHA2567005e8bae4bcff4a27744a8a668f6a3d445952cef0db49f95f1b0ce8f8fab7b2
SHA51295a1f846123ed6f77fbc45988e1bc28f91101d67ca877151082e586cfbb7429818bfa9ec58d4a1c2f97be5947ff4e227864942e1cde2fa236aba0c353dd11885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b9785bff77192dee35b2f6706ee8878
SHA1e9d5561eb00f859420d6299582b7f87aeee9eca5
SHA256215613a70fefc839f417600ab5686c17e5e7c7f12aa8620ef70db7294e4f4fd7
SHA5123826f0065013e9d66f7be5e7c2f131137fad250fc8748334b559e784b32757ec80dce1302edff358f995aed2113e7fb956127a4cc3fb59191f315f72863500c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ac64da211b430f91dc43d7a9413b410
SHA1fec8efea7b0855761f7363bace70c8f8dcfba394
SHA256be936806be4c656b8bccd19606b385170e01538eb4b310c15991722e81b55695
SHA512953a96a3c791345513d2d06d6d03d19cd906eae9e1f591e0682e86ab613bf40225b014783432e5ec44894180b1a1573b24e4fd8001f3dc3c9c6458cd72934644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c2d5a465e415a7dd7b4ecea708847a
SHA18ca60d4f2f0c180d108a468976ee7cf6a4a0dc7d
SHA2569c001024f154987cc505e027f7bcd3a5ffe5bb7bced4b58d04913d97706b426e
SHA5126648fc0d859e46fe3da254075d3f0f13ed1b34ea2e7713d31d9275afa39ec326373245f9269913308e230319d68dbebad51dce614dff96f8b72837ee29c855a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565918a5d7fc3c106a0964fb2caadf4d3
SHA170835a37529496b2014fd64271bb05a411a6c8e6
SHA25682779de10c8aab96c2e4fd2e38e38a529dba17cb53c27b62276816dc9281a477
SHA512f0441ccea01cb7d284502b1cdd78c25072b1ef2e71ab353018552aea40a96e38c5f9d9e08e1df73051a7723df6c829df395fd3fa689139114939d9ec6dd02eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e05fadee9ac80b6d3f67273293d4be
SHA1ad13bca39cd5864865d09bac084c8dea6cf8d379
SHA256401e6169b7755f837c0df8b0157f455902ef77c6ec6d1cdedd52ada7fd594596
SHA5122d8530383dcbdbc6ba887f9da45d57cf2816c90673723a0ea22603a96bb2b95db2b0753bb65898cf8707ead868998739af3bd43669930175c6ac4bbd47a0d29f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23f42300835b35baa35dab900605344
SHA197d7c6a5fb9162bb284628bb7671ba3108f1a100
SHA2560a7af06f6c63bb11df94998139ce1de1977e6984e9586f182eb9a77c714a56f3
SHA512182337529074969d2bcd7e3e8d5d7a16e35f0765be9fec3b470dd875540ace1f49835fdb2950b7ce8ce1c8ca48d9052810e77a1df7c887e91f01ef7baae96557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55921a9863c3209acc00a9f54bab00591
SHA1f7aca0ec19a168cc9ea35fcb548afd4a461d007a
SHA2565cd178e29d222cdde4b70ff13a9853ee1dbefa710e5290dfb9ac030812099866
SHA512c62200270fe0abff47a58847fad5f17d4684c1b64e5bfa17e011c5de82ea92b28060ace50189357297b3871c0838a8aded3de4f1f35e18a866ec8cf2980d0931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5702afa984d014069814594d844e0df8e
SHA12d790b15419e41888a479abaadd7c8c5adf8a063
SHA256b9e91b8942567f783708149020dd9bafbe2ed58be9b3c5f962fb51221c8b5a15
SHA512125a7870ae708a71e3ea85245df1087fb4601219ae97e8aca55626d22dca869a33313c014a80970405bef5caa3b34cebf46648fe240416003d40bfd980ce88fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55846e5ab0d3ed38317430bdd68270ec7
SHA1882acd59a0a839897d4d20e05b7e724f9394f583
SHA256891c790b0c9801cec14b4ebc9a961c37fd00b1d8578d43c9fa3ec3febab2c4c7
SHA51263cce1b05836ef0e444fcd853a8742e5f3d9c36a7b3941022df57cd2a3aa776415957b7a647b201c68025ff47271d50750e39f34842e43e089ff0b5b98da7ce2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b