Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
85451c9b134d5722225353c2a4823c57_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
85451c9b134d5722225353c2a4823c57_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
85451c9b134d5722225353c2a4823c57_JaffaCakes118.html
-
Size
173KB
-
MD5
85451c9b134d5722225353c2a4823c57
-
SHA1
8c8f7ee8d90926b40c950c67bb9c0c7c9bd9e74c
-
SHA256
d674aa4625c7ce12cbbb44926dccea1f4b389524f5a8411fcafd1b57a9becac3
-
SHA512
31f67204c1089164a7d554b7c14243c6bc80ce8cc901e6ec7547988083667e2a4fda31786aa83e44fbf0072fde103e428525635ae7da01e34cf3acfd46ebe104
-
SSDEEP
3072:wRQU2SG1Vz1PaUnq2d9RBoLrNGgThUwJWU:wRQU2SGM1X
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000004762d0d3b539e258cbb16974f35800c25e42d29669352c79e07df94bbe5b3194000000000e800000000200002000000068bc7103ea66333afd850ab413990622b07fcae2ffd6401c3fca8e70fbb39b7920000000f67db9bfa7239811a7ac1d8ce2d7fc224c655a08f46d51e15b086e41d1d639d640000000d33be4e0f9a6c221076a372f9649f315bb1426c137d2c27ad6dcc679781a9d9bbd7336375ae0f942b18618e6a819068512531118c0ba3b4a1e73a698043b3b2e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B86AAC1-56EA-11EF-916E-DECC44E0FF92} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0dc761af7eada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429436819" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2844 2212 iexplore.exe 31 PID 2212 wrote to memory of 2844 2212 iexplore.exe 31 PID 2212 wrote to memory of 2844 2212 iexplore.exe 31 PID 2212 wrote to memory of 2844 2212 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\85451c9b134d5722225353c2a4823c57_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD589448be2d1f7e37093c9cc0c49aff636
SHA19619ff1393b298026699c46423b452df4da4edeb
SHA256596f9a607deb9cfda08d3629a787407fd048d8ca9db921ad2d92824073cb7e0e
SHA51293e16dc2569cbf5bf8483d0b1c88f7d75660f1d510295c4d8d93345664e27b2b98b5c89787fb119e5a479c8e55e6128909a373e470928847fe0858f7854d9546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d56a80148ba19b14e57d50742d501c1
SHA1b8d96893f6f076aa6960fbcd1f643b4c2a2046e6
SHA256d59a44878a5ccb424ce907179bdc12eac364fc17b64395022a66b403ee1486d1
SHA51256c55b6324d8a4a9db053790ce8dd96dca3642b9dce43774a14817a71c18a7d3396baef05bd8fcba27491aef042d7d5079ebc8ea2651a99953998618e6d69860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc7a1b8085059555c8edd6697e91035
SHA12ff34b6cae39b63b0ffb511d7118b90a7e9bff03
SHA256a7c560b8f4b907a3c6c4e6091ca8e466d61bcc88e3e0845cf7ce55b7adcc628d
SHA512f83b8e2877a7c9ba10255d517b25ec56c7e515ef92e5ff689f50b5514ab53405a86565ada028093428658e96dbe613846aaa548cd3e3bbcf19e0a7c260ed8ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f1d45ee064b9c0e9c2f3eb197742d90
SHA119aeaaee7a21f809f075eaac1f15af6a9b254adf
SHA25611f48dc5d569da446a5a910bf991440a94fcb38606fbb86c2d89903110e74fff
SHA51253a0bd13e191920bbecce76448c7f2d1a049f92ef38d7c44a3e81613612578a2757c280c713b1275d662239fa6317c0f6bd63d2838f60a388f5e03ac5e717e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c745e0af627a307003535ff4ffa516
SHA122334cf46041135e877901bad17fae4d9a440d4a
SHA25637ae20a5e5fa9b414a9115e1a047a0a261a6af0cfed87543200f892a2c9443ea
SHA51231c6f54ad1442367b6d3f5c85ba34e4ac8bd3bcc0f0d95c6054e26a89e56c544e8083d3efc992c0bdcfb683f8914007f561ee0c2fd536d7605b14326fc0627ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c4618640f242de88d4c9ce2861f0b8
SHA1cdde351c423a63e61ef223255a15a58483e4ea9c
SHA2562a1573fb9b4f4c22a9d18a90c4fe01c7f7e9cf04b46b86cb9ea7283792efeb00
SHA51294efff18b299bbb326c24f34d3184f4fd641e89c64acb40895ba8c07eb23b22d3545885b7f92a7076ce1dcd3052aba5e06c4d7c3d012d41480b3a2e420b2beb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad7f07230ed6a95292961105b793deea
SHA1f628a763d9c913c3f71dac48eb52ab7346495ab5
SHA25611a3ad37d2be5065f3de7540d9ec57266920d793ac17b894932009a4ef9f5aaa
SHA51262275bb4f96056dce739895ba288d6d6b7cdf3382ffee9d6d4e0a2f8d374cef6a0d8d094bdc1c175afb3f05cd27ca91c1c6006804b5d214b8bd8fab9ad57906c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a976bcc2681e27d0b4e149d985e261d
SHA17cebb48c4280e996d5b9959660dfccf1f8c33510
SHA256eb91a48ff6fc2bb504324f7da7dddf238aa01d24309af4666fe376e2dea80a54
SHA51290e797df4f56bbc3a804948d574f10426c9cc2d83fcfe8e6ae46c87f91796820c24628c4afef3b52d69725bca97f7c25ac3fe4f3fc6e0992be39b7ef1cd7e0bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c49ae21a1476192a8a84d2af5ccd9fe
SHA1d64f5ceef6eff1fe89f7917e09c64478b6f211cc
SHA256ffe5117984ca770bd4daba49984a25cd2da552903b8630d0dfb3e037373cff8c
SHA512c8e242394fac581e5a7c4c119b26a4ce9cbbde6745ad81ce50783262a4858ed2cfabf0276b75580173eae72acae748db04c8d5c06dc97844a4a4dfa11cb8b569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c191eda62d12c7047d22a282e9dcc07
SHA10e596476e3b7bd6e899bec542fb5b71219c56d8b
SHA256a09853bd9a8ebee0d4924d84efc1937e8b9ed26e01b98d99baa34c3bd5241c32
SHA5126d180c13f523badb841367e2b16488ec4b2293e637df84aac714df43648052673166903840ad9f059613d29d80c86011b15da1d125b4fede26a8d289547fc16d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d580b8b961bc753195cc7c8701a4264c
SHA14982219b1e84a824e92eeaa140ab8a4a6217a7bb
SHA2563b1561c9e47dbcd16e7b4e050bde14bf7a99739370934a286945fa6035616b78
SHA512ae83f7f07b482e91330f2673f50851db587688255998e8b68ac6ec013ef03e7103064be6cdbc97b0b3731d4a32f2791c6f738eaf505b8c8cfbe5dfc70e590c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a94f70f50c78f44fe8e04b6e10b2b982
SHA1f37c4d3c95bd7eae0ec56b0846b00236568aad7d
SHA25608bba1563d2e933a5d12b7c06712484aad75871875a6398b75e971dd1a3dd6b9
SHA5125d3bbbbfa778c4625e4f3df01190ab74d8636e74064f230a909ba2fa251c2874e1bdb84c2be67d42378cd399563cda1ea2b483402847b548c3b1d3981a529c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b2ba3beaeea08ad55fc8bc49c6851eb
SHA1c84009b00fb79dae65f0f69ffe3c0a8257ab256c
SHA2562d80f40f73761bf60d0efb897371b3c21c4c35ddb4d84c97aaee3935defb9d2e
SHA512906aac641e86c9a9fc0bb58d5de83b110162be939b8c8c109882d2b10f9fdd9dab4469c6a8e9632d21deb84e21a1fec75500595e07591398979a58fe4d072509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af03d211f4a544a00ee4cfb74d45803
SHA103233eba1ab7bd90a7ad6a997eec2f6bdd7498e9
SHA256471df11f2c3fc6b75d2716812ac2276b73af0e03ffcd387bc4689d77de5449d1
SHA512be1e156b3b06d8deeff13c172f850ab144d3f5b8ff632e94cc2e1831f3a3cd2dc80f44f47ca073b64fb56aeb188cd20543c2aea321cec4112ea41d69badc291d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0ce7dd7ec9d573e5a38f15f456f0e5
SHA1384a44602b50cf3baa595097e35bb1047fa50811
SHA256ff08a7b8af171f8ae687089cbf3b32d084cc1defd4b378ece9d3bf1ad14c4948
SHA51253df1599b1a0c48d1edbae3e5918d1a50eda2f00e9937f1abd71bcec39a86f74bcbfaa8c6e5363c22ae0129002a3fcf18e43a1745898b929ab645e148bde2006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5bf8bfd5e9a9ed9aece27ab2a218a82be
SHA14698e16473eccc00f91ac56a513b44f048ed6209
SHA2566fe272fc31b0e4d1f9a3a956860dd64a7d361d64a33fa4c6e905f55e7ce74032
SHA5121ceed321b5fafae426caeac30a190d698b5bd42080ace849f51200069cd51f4d238d4b9e136d85fc8790ccb6f2e11856edc423c74f24eb39aca8b269977cfd58
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\39GEHZPO\cb=gapi[1].js
Filesize135KB
MD5cb98a2420cd89f7b7b25807f75543061
SHA1b9bc2a7430debbe52bce03aa3c7916bedfd12e44
SHA256bea369fc5bdd5b9b473441583c46b9939232bf1f98c1cedf6bc2241c4f5068d4
SHA51249ccede4596d1e5640a9c8e8be333f9c18812d58f02b2b15adb54172df1387439e9dc5afc4ccd9d8f0f75f092318bed68d3cd577338e88ef4f9373de8a07c44e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LPQ313RR\platform_gapi.iframes.style.common[1].js
Filesize55KB
MD5aada98a5b22ec7188655c2c17a083c57
SHA17c3c2fb8744e7412d8097e28f588788d91b9cd9b
SHA256f2f09baa213dd3dd95edb5a30c7764e4a44d9a79c0831f90b1ad8ebedec9dab8
SHA512a780aa3b9e36f61be8240487e75c19a96fe26d54abf9006680a00af9d1d394e81e517f0bbbc13edff3a7190679260ecd56fd5cdd7c2d2f416ab8982c3277b953
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b