Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
8507eae13a790cd356c98d11aafafb2e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8507eae13a790cd356c98d11aafafb2e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8507eae13a790cd356c98d11aafafb2e_JaffaCakes118.html
-
Size
3KB
-
MD5
8507eae13a790cd356c98d11aafafb2e
-
SHA1
38b1d1d5a582a0fa125266da54d1dafdc95021d2
-
SHA256
297dae0dec10fcc45df370187f3e382010f5d4804933b1bda59014ba234c8a8f
-
SHA512
3626682e1fce375f09d7c3a3f845fb7cdfe5825e217eebe2ac3dd80811020c1b705a6ce8d449745a4c82a1bd358c857c61b10aa9055499ca3e1653a1bff51457
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09f04dfeaeada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000505b256ff9365edbfec61da26e16809c936db9168747546eb0d2741d01cb24f7000000000e80000000020000200000000e42896b0d4d342f6afe8b9bcf1a6b7b09415e50cecea027107c9fb9f3fd2c299000000033e95bb8dcc9d5c9731b0ba8a57e3cba8982e2c2c9bfdc75ec0bb62883f9a21332edafce6f1f45b4b0ac193401a415c494a19b4a39f03ecadda7a4fe39d617150952cd2a19b2073ac0e3221f07689bce43e1d935dd8cd5d24572944b1515511c56253d2b1bdae58a8fde3acb30c3ec67e57c6e35b797d69f3927a7b828a94aef667511ecdebe7b90c15d06db06740062400000009039fd6e9a72995586521decb713233ac3b0a7c7be95c3755a519d0504a27f75fcb793b7e8442ee9eec5c75d10a6cec254ae1735ce6c26a5e96b30790281eb92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000005408708025e0fd8dcb750c74268380bc3c27514725594a5a39e5389888d9cba000000000e8000000002000020000000b250ab6e32e38c8da25466174a30a72f99c8e4fbf64c00d79d587dfb78ce9471200000006f52f390f7e7cb9149b2bd62a15ddd4be1ab6fcbc3f5d2a976bc2339952807ec4000000010a0a9d58f1964f76398c7d53e2c036463178b9af110662073c0d677e7c467182e5f20b230bcd1ef7cd3cf14434ab09fc5230ac399ebae4faa0c7f42c550c52b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0AA124A1-56DE-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429431581" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2700 2172 iexplore.exe 31 PID 2172 wrote to memory of 2700 2172 iexplore.exe 31 PID 2172 wrote to memory of 2700 2172 iexplore.exe 31 PID 2172 wrote to memory of 2700 2172 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8507eae13a790cd356c98d11aafafb2e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58176d61d5d813821d823cfada043d9b3
SHA1f70665d01b0f2e896e0f4f0815e2d221153b4eb9
SHA256f26de0eab0b8f2b792c2096414e95599e3b8e652690a1bd4c6e9f918bfef12fb
SHA51221b6d4747f065dba518fdf5a418cc17b385be87a469d22e3d6b631acd6e7b62f7f460ad20cfe6382b5c84db7647be0f4b6dc3aa57fdb740079aeba236859266c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e994dcd6c1077d18b49e826d9411a2c7
SHA16c74d380a73f7e6e26eec34ecb6fa2e65f288c67
SHA256a97f1de8f2218e21a41a30c102946396ca50e3cc561001ce8c4ff8bf6644703b
SHA512138fdc1dd744b435096053da556b15d8e0aa16e06cc8de62e726b7e1a240d1cd674228fcf65b17b51e53adcaf51a03c78e1841d2011ccc599fc4e4b3e2bfe3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77b966bae05541317de3b86efd18c45
SHA1df9435c2ee940544394d718422637ea20b571e06
SHA256706a9a1b062353d05cd05cac073505c73717f6791211d2050732463276dc174b
SHA51283adee4af3b3946893fad3c47eeaac2fd81d3aa561b7807ed8817f47de6a2d4c29ca8cc76696adc8c80087bef2b5714a43bc81fb2ce979e5b09daea879d80dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ae9fff0c2e637b28b522f3317c71b3
SHA17a4520f102ceea8694d2945778dd0aa56a996729
SHA256ae3773a90aee84d54ab9f0db66e84797fd6aa878f12257e49585dd4970d52ee1
SHA5123b3c0b08a9b93fa6a0f89b69daa6097dce3191618ddb12ce7164f41ff87b224748f2b790de558ab1a7527604ea25209b22d3fa384acc313abce11eefaad2cf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1364d9313a2ec096348daae8680788
SHA1b528a706b452d2ccc568dccb4ec65b5b15bc4e92
SHA256d8bf19cfd7d3703f579820b2fe975c534f0a85d5e35dccca4b77f45a557d923d
SHA5121136806d153f40f398d6064e0ce7861feab49e22abcdfe80926c859276cd1fc74462433115e4225024eed2144d43e878b643aad3f282e6a936ad3364c780687a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55498f34d09dec171501ace62693c3d55
SHA13d3d70221f8782fb6959486eb02cceb5b0a67ef6
SHA2561765b3d8165e803dac12ff00676bfb47f11224e3c2868acc92754adcba67cf43
SHA512af3987fcfcbf0231c4e4433b75929241c19248edb31c5756a7cc43f4c1f02bb05b483335cc706c5449c3909a92fb06f77f2dd462197f8dcfbe1b5e75926b4dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4877884cb97dbfa66749004c43f87f6
SHA198cf46988afcb7e2f5b6bbee18b0628e6a49718f
SHA256236cd2907014c1946fe038da07a748ddcfa1f97544fe8a000d42ce78898a0567
SHA51281b1f0db195b20eaa714b8034d1ba8eb1aa1acb9f1544565eb7fc45f052d0bd06f9290d7ac61636679b9127048a4e5de76e4c77d1ea384c2950c720d49034519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597bd6da15ecfee20eb046c689daee194
SHA1863d192226d70141c5591147824e4d77c926b4ca
SHA2566a1cd30c55f64ac2b007fb266036a9d880fc443f8f9aa04a38ef010f64784de7
SHA51246804d47c1744bbfc5eb6db4be10b9e76be36a22fbeea204ef0cb469d1498ff15489f60a2cf1e03f2e8b73db48b7857962aa90ede84a859d0ba8879ac5677b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92a8197635e253e5109ab927be026a8
SHA1766ece098127530e29ec0afe489a0c6986bb81b3
SHA256e7ba952ca7d085e3e8551e8067e7a4d7344cadc183f74635083a0e1d97ca981e
SHA512bca0ee3caf2f1680773b55af951ff932d6490da7af7c3633878028b8af11e7ba8ca18afdff375aab3272a05db308fed563c7b50b80f01cb931cade64620c1359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c6c5e112a2112329df2514a531c399
SHA1f6996ddc2d55b7f1ab5488a3e9a8ab6fced42314
SHA256ce794587a3849435ef5aa68963485dee90e79e7fac248fe0aded26ec2ae5253f
SHA5122379ce945cfa6b9151b23d630bc804d3a862564636a16e90b0d8e98474308a8332d0d4fdb3e8aa580707a029a8078c6b77e155905215d38b60989e2463b258ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50915590c48a246e46a678936a5338481
SHA17a241af16128f0cb1796b28739d2d0ed213d6a8f
SHA2560cc1a2aa843cae3cecb7621144245f8052af5ebaedb46d22ca5b8b79ba1e1776
SHA5121c705ccc488a8733ad5766bd4ab8d0356d5f5546c5a8ec4c4491739a025b6b438fb81ca5a8df677365957306c1043522526ce4ef85e2acda34b6bc268001eb58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8cccd9c0810b151f06849f4c9d8b8b8
SHA198d3c52a63555a398ab58e01227bcd27df6e36cf
SHA256179743db6ea1e94972aaafb58ed6ab87058b7fb663f470964891f4ecd29d548a
SHA51222c0813010842f28f9f1b60b3cb84cee2334bfb2fc594c46ea23e166c16a4c4aeeab69a6f0cfa99a8d9eb78a8e4fb47a3bebf98e4ff6e791630201006ec81aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524c0660d2295e085c16092b8d1d47466
SHA1339d4dc4376b537f27b8c0d3b17f89bd0d63e244
SHA256b1c1d0cae7ddf8caf19a25697706e9d9287ff8757cc7485952a443b23ed8f124
SHA5128fbefbc0b4fbaf50cc42bf61328af19db2b9ceffb998ea3ae8601ab54eedcf67b17e3d89736f5c98e17b4d5bab44f18fc46fb1266a9a2b4a4f9c7003055a5789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba6c6e5403fc58fd2f079001488d287
SHA1efc723021ebf754c1fc8086c619c3e6ac583425f
SHA2568051ccb243eecdb515920afdc0b55f8e48019b651939465fed4399443c35709a
SHA5124e6565b6c2c0a526b55d5a2c4e89ce9beaf50f9a207cace3a363299254d66f7ee0ae9a81f053fa5244ccbec5464d8a24fa92280b73067d30d4ee412062d24074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ba3582887aa066f0ad36d43b4ecfd66
SHA1995d3f40cebdbf78f544a851ce2499362f3b2ea3
SHA25689564e46f4fc2421bb7d9e4966d4375891cd5c5bd7b651c287f423f34c12f127
SHA51219397c9bee24be447cda929719d8a3dd6f7189f63d34c574c9b3b4664eb36c1fef0f66ae91ccb1793623667818db617e651fb4f9f5e34c23df1d79e5920ec2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fae695f344dbe5d844814c784f5247d
SHA131d967093bf8fc7b8acd682f379b46143402ece7
SHA256e26cbd81b19367c869677b786aefdaa28ae77fe5a82733fdf98c9f14c12f0321
SHA5128a5c85cbf023f1f589e54bd1e0943220554174e1edb8e1087e895bf4c4ef343e345432ba37a54fb581197ab6699f67ce7ea22b354da0ea3f225862e40583a98e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550863e99884d1cc503e0b7cd6c2588eb
SHA1326133b580870169bb757fd171dba016f8f792f7
SHA256d9bbee525d29c1ed884ee5527aa2dab24ec820f0407c9b5f84f67f6f0a560948
SHA512807a0830dca5dd1e1d81af825af0dd3d4f114c8df38a8f35ef364f4727d15abaebf599303facea35f79b13ac6889cab53decfc62ed73c4b92cf54f0bacd0d34f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59083ff428c520a913ba1d9dd7c174abc
SHA1a96e2b2006299aabb9678f03108033395664b8db
SHA256f689bdaa62a8917f8237e5dfe88562274ee715e48755980b1c8fd6868e292516
SHA51285cbad11a0733c5758658f911361f306313204044144a03a32945879682316d66d4106056186e1a0d094cb6424bae0dff837fdce43144987e38c3b0a96539274
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b