Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
8449779ec49331fe1f84ed1f36eea299_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8449779ec49331fe1f84ed1f36eea299_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8449779ec49331fe1f84ed1f36eea299_JaffaCakes118.html
-
Size
14KB
-
MD5
8449779ec49331fe1f84ed1f36eea299
-
SHA1
77155f8cf8d544fbc021457f706be0db1403e66c
-
SHA256
2cc57d427a4bcf3961fd396b4945bf1fa6ff7ac78061c14108d3784f709151c2
-
SHA512
2bdfe76e170a4f486ef84f4d2803a52e8a584760a81efc79a86a621dca8d9e6f9374a8c62d4441186b6b2cdb7024b240e773e6d4dd338e23e86991b4b90b57d7
-
SSDEEP
192:SMi6oXfHFUQe9a6Ar6pw67aCS/XGoW0k/4YbWCqwq2+Jcs+KZNGpj39S5cWk:SMHoXsvA2zKXYJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429414706" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C06CB101-56B6-11EF-B8BF-428107983482} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07af896c3eada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000749bac46e0892ceacae592c778c5a9cb25c7df846e3518fde76c368546bae0d7000000000e8000000002000020000000c81828c27e927da11a20a013b9605e0e84ec8e7ea7350495f0ca08def9cc398520000000a9b002394088d511c7d6bd4da346e0f0102f4eb23577fddb71da40a782b2b4cb400000009420a730ac48157075a808a652d63f0d603be9199169a0efd3d14bdb56a9dffc13251a64b91e47f664411c1ab52845ce2d2dfb0306d95ce87cf1c7b3d5470337 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2204 2196 iexplore.exe 30 PID 2196 wrote to memory of 2204 2196 iexplore.exe 30 PID 2196 wrote to memory of 2204 2196 iexplore.exe 30 PID 2196 wrote to memory of 2204 2196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8449779ec49331fe1f84ed1f36eea299_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51ea6fce7fd5f1b7be1f92550ee2f7e3d
SHA18562f8aa20b47c6d1761bca4b6ce584aa4427526
SHA2567ba92f5259f8e429170c286c01f82afecc67e6147558e28cba70dc19ccb310ac
SHA512085e74ff101db1851a19023a8efaf26dce5e48c4bd59eb86ee3ddb3bf9e79f736d2587c87c3e6363903aa816680783e7b9a753127ac6f663e8eb40e768bec14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50afe2374154e75a241fc7a428b9d6ced
SHA142a3df52aa7652d292747a81b7de4b33b186917c
SHA2562fc25823055715a808f1409707861a47d524d1841101260c5388edbd2eb8458a
SHA512f923d19711194de3a8d6311cee61f2243b1828076c3f2f41b26e09e0f40b92ee866ae1e163340fb3e6e17443b8659a64e541cc85b273bb45b10f965c40336746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58190ba77545a5fce53e1a342a0a7017b
SHA1f9eb0bc6244a801e1c30a7757863863eb62d6396
SHA256a90eb596c48e5eeeb9a1ca95dbaf55a2d9a5224f9262249bab3cebaf8b476119
SHA512ccbc15ef657118617b98efc4158b7c86b18d170aab630ddd85eb1cfd9480835fb080cc8c68495fa3b88b1f127754a6efb81347d14f488170a6459c6e91df3ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be4ac8fa21527b449478d3f7d8dad76
SHA147e0dba54dbc6891698391c3d503edba357fcf0f
SHA256c03972f80c41ff4f88f3e71125d2f152916e53474e1ac18189b1bb3bce33e788
SHA512b388a6ec6ebdb33f9e0abf7a06e1947f782fc61a0cebd1b40b666fa295f3ba19c4d5af79e2e25d458cd2b253802734c71d1f48f7c2a2095b13c8d983565b1290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54145263fe4b2ef6dc975950ba98d5173
SHA179d571badb2e065b5d9f4fe78db974a525433460
SHA256d3bdd77a2abc12d1fe87219b419b956428170d24ba09b0c61c9d042c1f72c4c2
SHA5125c3efffba38f662769dca7c4b20ab63fb9e6be31a9be495ad72c89e37c4c5a0b97185bcbedae380b9f54fff66bdf722725f4dbcbc100df7023d90d1e5201dbda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586bf74971a9fc97353fe6fbcf7f3194c
SHA1b03c85979925d6330770e9d0b33d76e1e77f8434
SHA256aceb8a5d5e68b66171254e1ef5447dc07e1f9d28845783b7f3c45d6853d6fc77
SHA5129285e1cfe8e23fb9c2163e5bf03133c27888ced72da4db94d78c805c293fc35f4160baa9ad2ba246d2a7ca009dc8f69f33d209f8c3f0c0f14d815a928a6c11e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa97ca5b09cea0d1bbc8be9ed1ecfb2
SHA177fd9c632413e29905506babe228fa510f625fd2
SHA256a0cf31a676752471f0d8c4dc81b9b72af72297f76bd98793d8c7c0bbb4758718
SHA512a7859f351f297eef972c1f3ddcc1f7b0fffd5eba806c5708c2cdf7bd4e39a05276ef6f9369bca200d1328d8a4dc32abb3abb78f7e9d59f064b1ff64db07b69cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5102bcb893ac22f373477b4166728de55
SHA1efad3b2771fb59885a247bb02c2c32aa991cba04
SHA256bf8d87bb7e17cc14e6602ef8ba2aabff6b4cb26ec68a9d8d5b8aa1a9d99c0df6
SHA512e486eaba299dba1dce5c05faa4207941654eb4465a87b4dddc2bab54ebe9e0e21846696ce6e21b575e7466068204884e8d76537b78e26777855d043a95ef8d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e772a490df1850acbb7833c73b8c318
SHA12451345da1fcaecfa2e2dcd8533e5a1ad0e45f9d
SHA256cd574dd9d1726849099d8f880d206485f41efc3a85bdd2acac6f0dee3d0c74c2
SHA5124f030743078f46e6f4d29fcd5eaf3261a92143e85f3dc14ec16b286782aaf25d27ee2ab6cd52d8773b96a78db57e98eef1926351a762a86c176c33cb4c889cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575afadde26426bfaf060cb2d8584223c
SHA1bc37bc16643a45b1eb006a392e9fc461b05c3fb1
SHA256c9d6f157ee770f8b971084d2eb7f867cd2d1a665a3bf0875faef2c043ce2de31
SHA512d15047447b7f927670f02c18a8458f7d4771131f783be704cfcb49b01d10eab0b8ce2b2cae553652bf41a51f3228089a646ccf2dd91bb8602e40ebfdb9c3155b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57daaffd3e42c61349f180a8b7840cad4
SHA1ded61191830bf45100f43acb8128c9673caf63be
SHA2563bb564c4ea1ef6b766d9ee1bb24a43bbf38791bb6389a0fb4333d2afea0159fa
SHA51280507a3d1a1ec2f61afbe95570ff6a56ee1abc12a743125d943813e8ee40f867cbebdb117ece540302c083134463f8bafcb818579a27a54627f3d66ffdc3ce57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d570fee540c53abb2a848423f7f56e
SHA1158d6773aeea0bf7a58b83608962db10377aeb02
SHA256e35b1c2dc0044638b55681362ac94f1a071631bb31550b9ec0dcf83cdc535caa
SHA5127b1897b835cd277f86c71890a4c99f16272d5cdbd51ff1793d586305d2b7b75434a82a537afcb0040a59aa1c74087656393240393749e0ce9aa73667d111726d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed13aa48a7ae83382ede2d6f76b8a7e
SHA18456b724013df9a295767b533152ca815a5bba83
SHA2569ba326941a9a25cca29fdd8c0794ecd05d779e196c0ac9f75344e0f13ba421f7
SHA5129e56eb1207853e16910dc1ac6797a53cd450fbb514f504e4e134ca09efbc9b08c3f439ce05caa52cfaa88d6d2bf118ed5db1d7c088e99c7a6e50d4bd68b9f2b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d33fbaccc7650b9678bb88d5a2b34eb9
SHA19c951b69798d26aa4fb9c038a29e81662ddec89c
SHA2561ed8fc014a77daa8122ca1a32245abc6e42ed9a4067db1dedfd92ca7e9642ae5
SHA512d0ebff2606cfca5594d5df400881f1b2f0c25bd8a0576562dcf5fd679303aabc1bd82c25de33df583fd46b7693cd1c2fbd34e0d73fa009422c08da9199223677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD500fa57314c7324f385704b48c16a9455
SHA1fece24e048f9ac5000907d657e27b97dfbcb7b5c
SHA2569221e75bb21092c078cc79d7ce043340cd822f1c457d566a5455b01b6363074d
SHA51298c83d1dc4e8636a4b84345b5f84fdd8ca85e25f522294ddf9f1ccc9ebba7d144a48313384384586edc0a6c6497ecd3c3377f503c5d8940eba4e9439f0dbfc37
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b