Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
8807eff78d39feb67d8f550984b71eeb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8807eff78d39feb67d8f550984b71eeb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8807eff78d39feb67d8f550984b71eeb_JaffaCakes118.html
-
Size
53KB
-
MD5
8807eff78d39feb67d8f550984b71eeb
-
SHA1
77a05bc0bf934fbc791d8f392410a520526c048c
-
SHA256
9016b6e3ebef786402ef3af3e3ce21c7d570be5944ee7b06a6a6beec084c990c
-
SHA512
b4f73a34f9330b66006c0e300250ea8174da4ba5453d33f3578cd9210e9c3735a2bcf1330edc7d71b9a9d3689ad8b43d0184ccbf17b1aeda43be23e5a9b289fa
-
SSDEEP
1536:CkgUiIakTqGivi+PyUHrunlY963Nj+q5VyvR0w2AzTICbbeou/t9M/dNwIUTDmDa:CkgUiIakTqGivi+PyUHrunlY963Nj+q5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000009d1555e8d08a290e18e3ae8492a4d755302fae1c1fe7d67ad1442927bf125749000000000e80000000020000200000002afe1a30b8d878da93069ce608426e90bf4bf8b2161325d21c34e2716a64c30620000000c091c5953bc4fde3e37b9ac9a62e28f96a704a484dcb4cf6807ac45bd84322d040000000183a5cfd4691970d76d5d89e97dd0bd55979c4c843d992a607f834b09c2b40cd54f5632ed136356086aa7342370c115302511ae090996f1f0c96f07a89a4e011 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301688db79ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{040C85A1-576D-11EF-8FDE-E2BC28E7E786} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429492989" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1872 iexplore.exe 1872 iexplore.exe 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2468 1872 iexplore.exe 31 PID 1872 wrote to memory of 2468 1872 iexplore.exe 31 PID 1872 wrote to memory of 2468 1872 iexplore.exe 31 PID 1872 wrote to memory of 2468 1872 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8807eff78d39feb67d8f550984b71eeb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1872 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9a9f0076a732cf7ebafe21801263865
SHA1202b6108650fc51685a12ed4eb2e404719e63686
SHA256e8dac250ecff3e0f34d536bc7bac8a4c99551adbdb42da75b12495f5d6ef13f6
SHA5123c6d1d346b52681cb607439e18720fc9f8e97574617319306094d8138ca97897429a20fedf018e1ed3a4a42877e1ebac11c5af223b26fa4d37ae5a6f8418eb51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c3b455fc64d9c08028ce39b4ad84a9
SHA10313727542fbc2acfc80540f95a192548fc6a824
SHA256635168d798b606675f7bcf2314fe57d8e298ab3f2a1839ca24f6aaeb32198a26
SHA51216e698c9205a6f48cdd1521dd796f3bdfc9dcf398182fea7889c2cb9c91ee9e7f92e91cc3e71d77c7ca5aa9bf25e32496b1e310a45b48fd48f159e84ce415707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527ac6666a7598e94d476b18567868102
SHA1eef2b1a0125b4b775917444438512333d11b3712
SHA25630dbb85c6c9be3f038f1ec788b9a844d8fb91c396e9f7cd2267b4f57873c0b18
SHA512d2fcf7566f65b2a3b8a3297de41c6049060408c34f5baa29cf5a305431f5271a4320b217169ea3751fcb1df09c86577666fbeec684f9250a4e886d38c496d88b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e7eef495f0dc7eb08678e2cd44a814
SHA1ed2e24bda9469371a2c3febdd8a3aa88608fc92b
SHA256decf9dbf96267ecb3b5f472c503f7fe5a26c009d8665535c02913dfb3ccdbf0c
SHA51274803724045da1367cb09fa24ab977ce2a7e60b7634e30ff9f4da2f51ad3f2ec82cca8349d0d296037cd64a03295d2ffd32851e3d1845ee12843296f2651d0a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f55df7db3c06f7c456013cac437ac37
SHA177bf9a11c63ad2b295d4cc1ff74bf13062ab88d4
SHA25660abd05398d921cb301cd107818dd8ae7a7886669a3a944d0a21f529e62dca61
SHA512b112934fd63b4f53e999cc37ec41775799b77e81815baec496fb50c47c5e2ee5441c654b53a1b70acb5e0c3330abd256303fd95f986d2e552d66804c2486f87e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0c607e01c9e7653c623b9c981f0d89
SHA1ff025e028f5e095d57f2441ea1e09bda8cc20388
SHA256dcabfae1f7bbd00b0a4cb796737d80fa6a8be1ca51fb1158dc155c3f7300d884
SHA512216edb094ac14f33dfdbca3c7a7a4dd6c9ad6dd8ae0d014602785d8b7d6807759ae875058a5090673b066414613508ec5d399cc6c0d0ff9c3be6d8d07ecf3571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e9a8a3f0fa3ccca1effbf3eabf2bac
SHA10094ed6f79547db7f458ebd74e398d0e27740e61
SHA25645d1296fd74d574423d26ed0d91df3cce5cb629541c2c13a5e06511b5bc00d3c
SHA512ca5e818928540bc75193962c673fe1c35fe61bfedb4263003126f412ce9cfae03b2183f502d1f17fcf03382ddafc43fa00a2949678b8b754f2ac773620cd1a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450934d4c046fc650f7439fefdb36d0e
SHA18d8fc0e5121929247b0ee27a7c20b6cfb8550266
SHA25698d54da781081b82c99ad06f724a658dff0983bd4378e2f08109483461ead154
SHA5123ae0c566151161490b70600dd7a83bdb7736045f5510f821663915f08f775e79eb09359dfa1f3e40e4d0e3f093aea24e12cd59d30ed10a33644009ada76fed09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ccfe06c3186e327874fdf6d16c5e9a5
SHA1e40da0b5e1cdda70dee5baee98fb89925ca86aff
SHA256aefd0b1863454f7573b70ec9e80e1ec0c4cb72d2a51158d7b434078c446df672
SHA51278cf302aa3e5ba0ede949a41297537a118487f07eb84c362384ad0ddda56e8b720e8338c4df79e52659583dac9227d82ceb95ca8070f962450b4956f93d524a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5822195c1cf9abcd20ba0efe7c31c182c
SHA14e63e1347939bc8d15fe2f63050215b947b45b5f
SHA256648c97f1db337b73795ccab173e4c25bf197868ec1ceabb1ee22a648963c8839
SHA512820af6fe06b657dcb88551b6a7b92ef210d4023ca6be9ff70bb505beee502e7a100acbca206b96fc6207a790fe3f79a5b38cd1940683b23a93f63f01f5b6017c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc5a1351b36a3484324983b58c73893
SHA1b483a1ea1b2622a5b72615e9d36e6aa19f82971a
SHA2566e46e2cfe3d1444b92921954ea6e1dfee060a59b81dd7d7b0e5540772d882ef4
SHA512d0bd74e9d5612d661c8929cd69fa51d87b5f68d7d6f151d5c9ad08e86d947748c3cce6e99838067a41f6754453308ab304f1f71156c311f19ff1f41dd032f41a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b