Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 22:56
Static task
static1
Behavioral task
behavioral1
Sample
8802b59497b4779a9b24304eed2d7519_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8802b59497b4779a9b24304eed2d7519_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8802b59497b4779a9b24304eed2d7519_JaffaCakes118.html
-
Size
66KB
-
MD5
8802b59497b4779a9b24304eed2d7519
-
SHA1
ccc8e5b304c68b3df27a5c02c0b6365f2347c38a
-
SHA256
4090668556eb5f55371865481edd3eb89e861dd1b32dbc52b0093532a02a0b67
-
SHA512
77d5f14f6803539b41f7e948384928e1936b2880615bb7a230716920883c2055cda76fa9f32fc6d47ada6a1bd9dcd62d2fb09f0ed1d853c6b1da17a83057339b
-
SSDEEP
768:r9puZ8LpfTORHk8hEZTxLYDDl9IXrTKjbYXN7T1FBQ:ZpuopgDDl9IXr+jbYXN7T1FBQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429492471" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000b7f2810b98674cbaa6a65a9f9f42dcf6ecea727cdc9c620e34532fb60049f935000000000e8000000002000020000000f32f7902d35ff98eb82e8f8e518477e71105e70dd7bf74898ece91b14bf3ca0a200000008f812b615d122b3b145d80f9994081c6839800d7eb4bd3dc03f3eb8268f189ad400000008667ca3febef00f26eb082164a48ee698d299c45c1324b45dfe249b60b5e8c044336853763698ba37c4c09439584381754d1f514470adf6a9007c9d532a98522 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D082C151-576B-11EF-A641-5E10E05FA61A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40821da878ebda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1096 iexplore.exe 1096 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2104 1096 iexplore.exe 30 PID 1096 wrote to memory of 2104 1096 iexplore.exe 30 PID 1096 wrote to memory of 2104 1096 iexplore.exe 30 PID 1096 wrote to memory of 2104 1096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8802b59497b4779a9b24304eed2d7519_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32e87f52a5a37d0819bfd6c7e2e7002
SHA18f302079a0f9d67cf546137372cdd597700f4aeb
SHA256805a143d7a61d8a8643b1ca3b1504233326e907764a7a6e903c9ffc828c366db
SHA5125273c5c60fc6a8b95137c6514f03bf4f969a81d33ba4e28a1d162165a42026bd0acb52e8668bdc93f6aa6276edd879146342a0c9d6873b5eb4c4178acf26820b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509614fedf29e124919ec53ff07f8a98b
SHA16a8e73ba368167590821a2bb54daead73feab7d9
SHA2561901b37bd569d896cc45486d6a72e67e5afa03ed3a9fc8c29511674360a223ea
SHA512ad4c6dabe909c82dbb30abbbba552957656d95e9ed8e5f34aa4a69cb3b24f5413989b6d02ce3ffd1973e07670abaf758165bf72baaa8d7712c8d0bcda4f8794f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a7f45930f3b734fe5fe08b96abf881
SHA1891250ff6c76a12a27d8dbb5db8db56402b06a9d
SHA256dcf4cb2514966e76024516d04d614a042540145b9c56044a12498d38cae3009f
SHA512904e529b969f088cea64c9a91cd652b02a46cb7d0c32eac32e53416f0763b07575e82a1c73ebc7f514beb0461d0e148b7de84b561f7419ce1e33c24ab980ab0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef0f0c4104daeb69e4876f96982462b
SHA1e7bb28711bba9c78e99e8201a7928427b33fc564
SHA256dd368dbcb0af746527f00e2eb9566d9b6e6658bb1d1c98da61f4f6f06acd5e91
SHA5123d03d60a673b37b647a331634a888719bd107396b66a41ddd78eeaf96ce92f31b78304edbcdf2362bde56fb8141435c515addfe4c7f85a19b127801c6c307c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0717c91a6467d64fce4e42c9d8329a7
SHA1c0f56cf7f764ac00e40f5a8b0bfb434b77010399
SHA2563c992e464cf1f2095c4b321fb52cedfce71cee39b5e9424e77f07dd048f5cebd
SHA512c28e86c507f56bbb9cca4fa8afadbccd8325802eab10da635e04cf24c3eb202a0250d0a8d2e45dacc360da0a00a3de8791cdb7bf4041886c395dcd0633a6c4da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599d64309ae1f6482b0b5219f788f51fb
SHA1a15854b1630269bc211339ec2b4d4166a18a75c4
SHA256f8a6b097cfc54655de0072973906a08edea6949d5ea3cbc3344f12c0a8debb94
SHA512ad370f90929eb5af261c11abc277faa3b59e9da7f83c56397d2e2e15943b56e3c4607e26f3526be6c28c1f80d8d9ff671de3308bdff59fcaf6442bffa5e7026c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08abc6550351e48bf7d788a5c333458
SHA1b26640c6b91e1030b455d3e592fffdcac4d373e6
SHA2560235c257ac3a9673897b7e722f7378b5998f85526b4bca8cdfb64a33ce48b855
SHA512dc2b2680c3c74019d5b1ce829684feb056e4ee96aa6d5c7a7605b4cd6fa75ba65e8c1230b72003ed6b91b13a4c831c413d9c09f204ec34bfde6193b48dbdb263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baadcc5c56094fce76293cc8de74f24d
SHA1f2514b2780b05895d547c10aadff49fca36662cb
SHA256fa4cd65885c6cf61214dbe41f05d4eed091b8033372e7a32fdb1c6be6cafcd79
SHA5128eb428068590cb37a28cd05db3280ef32952977cab6759207ecdf81548ee88b62725bec0a5c45b341452f91e12096718bf798561ad806cde79bca3623271de79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dc4173628123990d22a9976be3504c7
SHA10f0453ccd695720afde8d613c076d544593f6988
SHA256983145ffb20403e6df05c911bfdf38c40d54e8adb6ea39a7017149dd5aa9c96d
SHA512505518935d34a1a44794290338c585e425307d6a9f254b874e96468fdc35ff847cf92704972819759b87a9684de9742dfe018da5933c3edcca3a57769da50c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5491393c540fa6dc878c04e9991f6b7d3
SHA1c2e35d49d3d62f2adebcf5ee86947bb35ad2fe06
SHA256b9328203c1a0fad915d6631663c99581b4c3a1f1e0b9d4840fd223881dd31850
SHA51240db7df3823b4be4d3a2815548a95f7d057608e59632cba5721247d7d504c921bcbb0694ec5b64690bf51101af8bdf1fb003b9ecf7b07d2a6981928ce7ba95da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddc7826e017acaf899ad6485f4c47c21
SHA186f6e040385fe3aff3edff68d13e6cdc20c846de
SHA25647a48df34b07a9a7aafc1373b9314e31f962fa69989ce1766b71cf70812dfc5e
SHA5122d338c81b5bb3d2a415fe8ded16c1fa6ef9316882e347fd521b542ae1c81c73a0eeeb2c234d7ebf978dd18976cab05294f3bc7b7a215fbc4799e96c6442683cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56afcbbc02765d4d7faa3e12632f6224b
SHA1ef0633d533954676c93ee93ead117c3a264a911f
SHA2568e487f338852cd913a0c359f7eb92279274b8a781fadea7023ada1d59d4d51bd
SHA51275f10358e37533bd487605e1cb324b6ba5a6dde0b4fe58b554ccacf4ca0d9969502fd8ab4a7fced31501923e4faf94edfb6919ffa1aef77a3e9ff7f76304f126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d717370ae3af62678a2fea3eb10609
SHA1b0010e4c4d1e060d575b5540c1089701f4d4124d
SHA256b99f91df4d3d241093093b776ab19c4d74a1e6f878539a33610c2cabf4fc87e3
SHA5129bf45840340c99e92402cf83386ba09ce4727257716c91522d150f8be847f7a94c43b014733933aa1a7fc9b743002f81b7116dc4f9492d9f7d6da2581f92c73d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f06c4e1612b9cc3c9c061ce255d4df
SHA189ce4e8ac1e29782554211dcacd02b75f0274b2f
SHA256f1a25b3dcd47028b514ab05f212dd915736a4b49aa86874f897dfdc3915dd50a
SHA5123bf66864cbb6df1a5e54e4c33f173e41c2b067b270696de23d47cecc3626df1f700bbfdb16e2b848c1003298746740b7ad79e94b3d9e06a26fbaa248080b8bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7b458ae56b1489113d94fc1dcc6a46
SHA1882565f01b8d70e9ffdbfe6a641c7f80fb2eba95
SHA256c92d2c328a60866fd9e23b03f5a7ee0c887d34ba1e943ee819d97775ba3e2da3
SHA512725f1b293c9486b2a7c41a18a779086b096c9a190160197b747a27c53552466adb7c8cb5c11e6c02954fee528f4dd59a5bec114067b2e3a09211a0c5147c1e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5954bc67716ccb72cb239d67b09b690a3
SHA1ad4be7792701fcf71c05d2ad0cf65e80df79a41a
SHA256509b10cb245d6b30baa18d6d69234566fcea7fc3432000c62fe57bff29ce9e06
SHA512a9b9aaf7bd6a7409ad01ee4366cffb013ccc9f35d98e70f4e5411d240a10cffd4f2418b67b3d7bf1c08ecf8c640493574de6a18afa8ceb04e8cb370a412a9a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5debc5232762bc754cb7b8ac2c5dac444
SHA13ac8e79e2ee449200af13622fb8c8b3fbdfbae53
SHA256656a200b32efbe38cbc701be3b92816d1652d5a7e07a321e4e47a25edb9a875f
SHA51214f788833ec63a7ef6c9d73d3dead87fef49aa144c4fe6e0446739b5add3eb22494e81a42f2490e0b5d0e8e024b448ea347fed8795690a5324e8b1c42780a3cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1fb659039b2736db29ebb66c607bf34
SHA111fa6b017333462efebe20c53fd4afd338a01618
SHA256b03288a236a948a5763eff71e5c5cdf1157c916d2f33a2fa2c643441f18202c7
SHA512daff9ccc2f1b0c3edd771cda81ef56d893414a11935c8cc5219cd71faa5a99e428e8aafd5052f9fd8527440f6e38563271f0b79158b9aac4aabd0db7e5e27e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621e3d093b8aef2c5207891a478b962f
SHA1fd6e841e6a97f324b5f2c4ad9bcd0c0113cfbc3a
SHA2565424b16381475bc98aad37b6435e1d3b446afa7fe1bc1d037e3b5717de63f1cd
SHA512ea33a0bd10396e76876266f6913443273c93faddcd56a488b995d432221a0a9c60f13c9fb761cbc7b99a1b300576338b59b3ef59e39ac451aa6f3c561eec2f8c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\N1261211353[1].htm
Filesize9KB
MD57f43f46a3c4186dfb0cb3fa5d9f4bbfa
SHA1ca062af855f7df17866693ff2ef49faf80ce1528
SHA256fa8c4451b8e93c0acd5cc73e227cdcee854e9968cbc79dec1eee3925ea928b21
SHA5128be999f8c50b867dc55d5cdf1da25a3fbe7d62930c601a6913f02c77dbffc5880544d4899cc30f1cc45d70b5f43103a7bd09f67d2351b1aa1c3e0550d0cbbdd8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b