Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
852c015ea3423e1aececd9ab8e582b1b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
852c015ea3423e1aececd9ab8e582b1b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
852c015ea3423e1aececd9ab8e582b1b_JaffaCakes118.html
-
Size
83B
-
MD5
852c015ea3423e1aececd9ab8e582b1b
-
SHA1
1c7fcd8fee63ba413e94638847bb4e0a13a4d83e
-
SHA256
414748ea65708ca9771bb2316eb7bc5d188775e786f68e8c3c89e2dbca1ac4b2
-
SHA512
d1204b32a095505647b08d172d7094ccaa389a67f6bea44d391879d34575e1af60cd41277cbc99a4ef5f7990fd062e8236b52e04ca8943cc9ca68ac48583aaad
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07470fbf1eada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000024704114514de575292f98db82be149c5b7b963feebd30e4977c29c4e05525bb000000000e80000000020000200000003f31264b553e5777035b56d78fbacdb40feaca78cec787614c43b208f0af87042000000091615343a557384f0a8a4303cda155a24799bce1fcecb2d5b4cc754403ecbcfc400000003ce2c69538877b5166e22107469ff5da4ce25af179b3d759320d2b9dd15cc0bb827b22629c8f8d940a4c990684475e81ae694129f00290f41fdd7b8218e0991c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26FC1181-56E5-11EF-95E0-F67F0CB12BFA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429434634" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2140 2356 iexplore.exe 30 PID 2356 wrote to memory of 2140 2356 iexplore.exe 30 PID 2356 wrote to memory of 2140 2356 iexplore.exe 30 PID 2356 wrote to memory of 2140 2356 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\852c015ea3423e1aececd9ab8e582b1b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe211833046da5b3857f97f7cc38483
SHA121e51b836b52f88a35aa6e86ad8e92813cf3c578
SHA256c85a71f54005c3b9f790a76086359b3aed6ec04a17b3d9283d1f4bd9cd8c1a18
SHA512266acea3d9382bd3ea11b435b28a654698cfaf9881e3fc66be5d2b1c6bc5a71b928ee96acac824cb5a8eee8d5d458aa25089fcd3016edad0160231a9a9699ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b00c1bf96f23cde29164faa1cf478eb
SHA12c355f9616128f8ffc683425061a471ee1111bd2
SHA2569970e889bbe6982218f05b17137bcfa1462ac595a1270d572ec05b9ae6790fe5
SHA512a3dbd5a17cde5909e8ce98c5d1918692abd9fb242efe4ee1df33613e491b70986bf115e2a3d093ae210c79eec86cf29d7ee18da03462016c80d68d7a43e3d719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb686f862ddd697d6844f9d7a21caf9
SHA1d9f035b203d22699096e09291557b57c73735285
SHA256a0bdc002c136ece3af903144a74385c9a877f158f587d8b9864810bf45b6eabb
SHA5121461deade0e589e46b3922666d8812a68d919c9c2e17e7c4902bd7e0d30a4bdf32708ff01a9c629f2bb0154d1efe942fed55f22595f7345f3acc90c4e76e4286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceeebdb2e731d52e8bc02f3eec86b393
SHA1c54bbcc5ed6fd428010fdbc0eb7dda9908ae05d8
SHA25603ade53eb94ebe4d25267db80840e8014a2b878e94b6dcba83b50b1ee17c1ac4
SHA5123754e46b54f4686ca3424bbf48769187a0abbb4ada470faf49d6cf98fde9efd1d81e939dea0e9e6fa592fa713ed603f9b15b7d930bef6862ac7cadb2278d2a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9faf71f11fb01095074afeaebcb3223
SHA1bdb62a22bfb3d9a6a7aa76a31b66b88357471972
SHA2560ee313b4da3c98e61ef22cf7b7fc266142553ed6b4aeb41964e1f6564c94ab5d
SHA512e979df5434d436e2120e50887349ffbbabf946b700cfd39752f258f06db9c2a3293d07176fd6c92c4d63c65c096651f4c6d11aec42bc9bd91f36f45de7827e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fbc1826f1bdcc74b3a64464b38550f7
SHA193ddddc60e576dd0b54b8517a2f5b5db90c64c60
SHA2561f063823c75bc566f8b71de7ab160149872af716643f57dbad200d7a545d44fc
SHA5122bebe5cdcf1837e43b282232467924e18644f40d88904fd6d1aa0b4294d2ce5d49b2e6eb2c63ba8370cb4c5cc4eeff0163f766ff582f759eca5df511e78cf5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a5c5e224bd439a841ae5f975979786e
SHA11ff48c47919e643b536bb06b1a31b581c75ed7a6
SHA256044c3d1aa4efb07542929176f654868d04b0183ad3dfcd944f5c0ec9aedef47c
SHA5129db26f8c87d569bb45ba36f0bd7b2acb4529e13201ed282516a31b7f18ae18f35658cdad0f7c9b27c6b2340efc16c4ba2d1d06279df54edcdb44bde35e49e723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58db117d4050cb883eb59a73f7a287821
SHA142a74fce7962de1bc4972bd1fccd2eceb8d11506
SHA25684daf1de8f265b905462fb681427ea85e06db6381646330f10e9187c28de40b3
SHA512f8cbf86d5a400cf9871d76f609fb6e09c9537adf80460f92414e12cbbe12df26f9bc280253ed754b776f0ad8fa8b3b0e20d241a96950880c64d5140dc78076df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519135bb7dbc60189a6a3aa9e40f56608
SHA17f70c2c27f3e24beadb2c860c6a8c132917dfd28
SHA2567f934447cf3d4dae62baffca192e9c8ce2e1495a9bb0e9e8e71331d73a38f53b
SHA512a1b5ab1b43d19a09a82c19fa1d1761e5f9099ba21a053c6d3243dcb620e1e191b85f7e0fe119a1f213685f51bc444521c6ce19ca46deed662650c935c9ecf9c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0cd5c66472af3680a83f9b3344f7ea
SHA1aef54cb5eacc8ce49981c8bd4234a025ba788953
SHA2561b429d6d7a3ed2e97e62e02d1bec8a9c32db33a7135e4489354c913c4e174c26
SHA51219486d2dd0844c88f7f2c54d6113a8d6eacc3fcbe731d2c537be18c1c7ff1ada2123464934bea5285499091e3b6776090349efc429f791e59ea19d2b05446a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c668a68d72af48754f90758e51411d
SHA13458cc5b28b77d560c9f388f9f7577659a40c9b0
SHA256e80d0b68e4f96bd5998f9b3bca65aa911b9de55dfd00c0d6e31b728090f993ca
SHA5124eff7acd2e98d57bdd63137f05997e01a85ff78954c10b436405ba6a60c3e7a9e8fc89d0432c89b7f22959db81ab94ad18dd85271bd74324b47250631ccf0a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5951621d4a854ef27c41942cea6feeac5
SHA157e9bb4e7c873f404db9801a936db402c35cea39
SHA25661f6e658709d0c6b16da0dcb8af13cddd012609c9b66c07da1b82e057f389165
SHA5126d715bebfde6ff1e938b3b3ceaac6bfa5478678f48dbfd51010ae0cba9eb6b0ecce3b75c77bb77e0fc5b06ddc5aff5921ee25bbdba7802afb373ce14e85c6ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec14fff85841ce3bb8aa3a1ce82d020
SHA133fd5abdd8b560cc201f4dc3fc99f40d07f866a8
SHA2569b69520683a9dec8aa59847a7f1f10dded1b080bf3fc97ab08b4b0802a12860c
SHA512ca8cb787055ea98f58827e872463236563b62b3affdaf654b35cf1a7c95792aea4b9281679c4859dd0eea40ba4dc586b8e695575ccb23cc504dba14e4a028a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c310cd73e19a594ef3309ea7ab861d9a
SHA1e24b12635c5982c68dcf86b71c82c48ff5875cb4
SHA256e7e2fee3731356d949605d11fc839f1514bffa6ec56f06645f06086551261637
SHA51224de483ecf3f0df6428876d9db367ad9cc8ddd07791ccddc91dc766c8f70fa102c8dde25091238010902e0a1ad451d92a37adf9df3be0f3875878d29855c54c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fbd319686f691cdeb886bfa65fe55a9
SHA1be138ef526e98680ad990548c68142414f17ad97
SHA256355e31f6dd9a8c28a441df4acc47b293924a7c2198b4767e236a2186731f05be
SHA512d63ec357c2bd293d831b0f1e84c27927219f3c84991d82d3d2cbcf182a80b3dec7db1efa63db12f4489731df5d0a30d9de898e0bc103113e9e12e0c8eacbed69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10ae29f068518035d9bee8a79eafa1e
SHA1c4585da756196d90bd10495923443cfea7bc3b04
SHA256b7cb1c8b4d872749efcfe5fa43fa8182bb8b29332f55b4035ae75d60e2a7af73
SHA512efddd50951d93a2e6a053d57053b4530aa2042166e3a0709be65a0d11e859346dd421cd11a818e6f3d5836eeb77bc2efcdb1af37c4317ae91ca365c688d91338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b91201eb01dba88631fb882b2bcd384
SHA1ae736c3c1ad87254d227bef98ef44b1061ecfb55
SHA256b8d556659eccdfac1ae0bd9df580180f21531217ca56f8851c531cd1a0637aba
SHA5126fae2241f2dfc16fbfaf2ec2a35944e810f23d1d451e95bcf144bda1ef95fb8a8d5cfda0315f3372b56b9c29162d480ef67a93355e9cde81d12811d8376fb709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52980cc29b974202755dedb271201b88c
SHA1b351e2c73deba5feabc5b5ff393620d3d2d5b89e
SHA256ddd49bdd1c20a1d6a1edf7b442606d866e0a4b1b40735b7471a842a7be5ad7ed
SHA51203797e41d6b01b8138e72b8bb18029e063d5161d81183a14dd2d3958c59787a06e592cfc445e9e200f813be4a974b00ca39527e90765f29a65f69ebb49afcf8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a0be400cc08cc623ff21388165c737
SHA12b2bda8abe9f7fe626dfbbba032998546e0cbc9e
SHA2560fb7f30d8c956965a37c8ddaa93489f2cf8dfe090e9b4b883cf8bbe9434427b7
SHA512c5a5b824d1c5784d92ea922244db36082a6cda3ff0eb05fab3d0a467d0658ab04b311538f38c6677b4ddbeb79fe7de017ee8a5e5f3e178bb01cd5fdcfb362b23
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b