Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
85918e93f10a290969a17909fb36d23b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
85918e93f10a290969a17909fb36d23b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
85918e93f10a290969a17909fb36d23b_JaffaCakes118.html
-
Size
3KB
-
MD5
85918e93f10a290969a17909fb36d23b
-
SHA1
111085e9e29a0bcbfe0de071d780dbac22f74271
-
SHA256
a41165ba41a94d8bc61a434fac49e1d1f5967e878cf265dcde707a563b9f2b2d
-
SHA512
ca07de8a5f540547f1cec51ae5ab3079e9bb51fe5be7c27480cb5ca1eb41d17ef680670e215e6170fbddca86cc643f94d1c93e835ec29a80e004360152d6d048
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429443712" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46482281-56FA-11EF-9F09-428107983482} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8057fd1a07ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000c63a5ea5917d9d4f313acd413d89bd0fe9d82ecde7af35a5745754ef539ad9d9000000000e8000000002000020000000da8fc24927c82de3612009118a4def626832a91485aaa591bb71c0b4dfb5584a2000000076db5c13f202136ec64537889da925adb88465ce9f0720f21cefab09556cef5c40000000edcf402154335b443da3d63df696f117fb97ada4451d2b1e296b95ababf2f15d81277f68721b65b7590541dc26eb4326e16209c356230700daf44017e0af1a2c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2808 2232 iexplore.exe 30 PID 2232 wrote to memory of 2808 2232 iexplore.exe 30 PID 2232 wrote to memory of 2808 2232 iexplore.exe 30 PID 2232 wrote to memory of 2808 2232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\85918e93f10a290969a17909fb36d23b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c152eae4e939f8e8d8087ac52e9dc3
SHA16f715bc88fec2ba743b10a9dc022f4d70d7ad60c
SHA256b635951c4639f6cab65107948ded1c32765dcf13030262faa67614bf3c4ca53e
SHA512b34a814189d48552e6b78b434e487b44ab28ce42286229de012e85bc22ba92a7bef4231b2aec0d17ea875bfecc1acb13f799e8d81d3e842678cbedc0d053f86c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57510dc021296c6ec70d6d87f4cd4ea6b
SHA17d228f14381a358f619bfdc55165cc66982196d5
SHA256cdee2938333b2e178dfe3b4e10b5697e78af454027dc87b438e8843bac2ec4ff
SHA512120623a7e04b6e4b6d00f0f3721c6ac91a76a5ecc58f0142d069318cb95c59716bdbf74e5846e0099ee9542013555753e419840fee4056a54f24d405181486f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d28b8cc6d02ce3fee22a75cce9078df
SHA15b4cee4d3befcab90ecfa3e47059bb3f087888a3
SHA2565ec02aeb1ea08dfc29f394c39c9423658589c7812cf211a62ddd6f2614c7a0dd
SHA512ae0f550232fce60e3d1195849487a12451c519a5d9b0b0f652606e3082e1216853a71a11372f3ee1ad64b0d2737bb33f79ba184d76466d0869b4080b16797781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c88c2fd321c7d5b67661a1811cd6922
SHA18d76da7818b6c29c6d607cf9726d1dd8b3a54a61
SHA2567a69cf0e9c48325d6bacec388b89144fc5a1d647a51b04ae7e534f07f2e13769
SHA51217690b4d05fc70c0c90c9e70b22991613ab7a5dfc73d208f01ac264730bf146ed68852cc1dd77cf8874d8f28175e235703e5ededaa7596907e282a427d9ef867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae1ffca557eee6220e355c07df2ae56a
SHA156b393b62a4de66cc173e2c34748c237f2ca9723
SHA25659c3ad4acc18f0e973872b8734e7597703398e5a35b9e2ab187a1cf4880d0bb8
SHA51276c80d94e3817485815e1413b5fd5347abe61a753499821ef42d09d264d6c14ecad8c84fb5d8f01d0edbc185b63e16fa2a83f3fa892d03c464d0a3fbb66e9027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba16001b45d2f08677d078f08dc2b0d5
SHA17d91c31f6372237e8b89e99695bbb94f19a70e3a
SHA25675480ed49106ebff36263a9d5b113a3f45b4152895cd68b28d51c241bee26d51
SHA5123242eef3fc85badc5130b11176abeb734c00c5fe9f0d5c8d57125817983cb71e6cb3802cda0051291ae441c414fb2f3a521b59be8463622f85e02286489a66bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cac71ceea8ad1172979b31491134238
SHA15aadd341dc27110ae1cc2aa1ab1c4d421b4f69ed
SHA2569697adbcfe5964d943470f1071073a827ec31d81282f76a58c0b147644f7c90b
SHA512b794b3036616870cb418b6aa4a1bcd9083771b14fb85da6a7266f0e62bc47c04b5b68bd03bf794857ffc4f20db15749f6643cea493ffa4c7d407276dec96dbc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5225fb4a6ec3a6e0606b52693e0019cf4
SHA19bc84234e5dc8331666e9af60f8d069232ddb844
SHA2569e4ef1ad389153872d22a856d9dd9ab097d11da254957e113f955e1cb2e33c9d
SHA51223d3082c01215ce134caa207034eab9d8ab4d1f5d449e2b3a51f387c8e6fe145fdfe15aac75ed3cba9d61b3c119dee64d1860c9f7ae51a362a37d208ffc6a839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5312fe0a8e8af920116781ee9f82d9f2d
SHA18f06d909e10c96a06b8df77698ad54a259737764
SHA256054659e21b2a7c09814c87441324f49076b625de4caf63a1bc1bc0f8f4cd3489
SHA51267b7526f726517ce368a1a688dc4b2ce228555b78d6f6be8cdb78fda5673623456c14bfed1288ba920d70de35ee6ea208ec4e0d19bd04653e95c5d68f423d42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c22147797ace7d316f6fb5fca2939a
SHA17f4b5372fdbc3e735c8e8c11c1d0b36a47ecbb12
SHA25622e60605ad7f90d49ede1e1c7aceee03cbc3987b83ecc6560a4dbfb0e170cc18
SHA5126ab07f62c5c6f5c423412f76c4395404e5f71cf1cab0681a4ea7beb3cb6c9a88e70aee411d8111c28c3d5cabd9faf7452f1edb46e91c075d38dde19035d87855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5961e62085c55a95a3945edf9ef642a65
SHA1750516044be4b923fadbbbe703a1434c79b46c7a
SHA256e065eb03a7a2ddd7d4a22c4adfdab797b4e16ae760da0ef1b9085c3d97b52a0c
SHA51295a95c17b42e17aeaa6a0ef41e71d0dd5445641b6f5475af03fe74ec83df85dcb31c55c35e6c9e351a701e01b05310a4590bad98160e5ddb9870679b1c7a56d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c1d7959d59ea68e1965e0ade8f783a
SHA1bba2714d09ab37c220f357240cd0488b45286961
SHA25628b6db0738f3ff3d4ea927cf082fb287f9358be3a1959d46da3a6c08c831a3fb
SHA512dfb73343a5c1b4768a4d12c417a99103ba871c40a647263fee7a10ac99ac30c4cd0a0eb176b0c0c78733d06c186a392faec81ee207c6f6687742ff714562a8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da217c98af6ec7ade55ae137716c73f
SHA1b2c67fe82596b8476fe965c7a8e9bc5852673811
SHA256aa1a5bd58679ba51d1abe40bcb2692dfda61d63a918c94dd8387c918e9621ad6
SHA51297c577371528215565b08040af8eced52b7f8cdf92d6263e8c0279fdd16edf8cd640ca2ae43712bbb835c87de22cd82a2607e1a33b754576ecf530fb5296a745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b15d21cde5bc23760b33924d03fd67
SHA1f10e1a86a560e03367ed6623c2d334a6fb37ec29
SHA256d5ba73e83788eb80897802967000d8f2a4fa8fe2b3e1f163573c8d1f92a05037
SHA5121308bd2b83f75c63730baa8ee3c3d828bede8b3e3e839338b48a4771943b43a29805f56fba5bcaff6c56e107c084b2c2fe533c793ffc1357c4ce7d3d18092080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe758de6f1157e05fe974b07aa9d0fb7
SHA1e4b7421a738cc9b7f614c938ed0fe0e0f34b724a
SHA25605e6a180e116585b46b698b02ac55cf6542f2dbf0154dd2247a379423602e7c9
SHA5128e690319e0d07a56118f034f8a8ed486a283381697ea622dbb124ab0a1fabd38cd68e44f9078a82f9e389c254a20721d7b6830e6fc703107ee2e52dd5c215b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5602b047106d10ce1b950f1b8f6b9ff97
SHA1fe4a5b787b316e2b8209fce328db8435b84baf71
SHA2561d41397b18c1bb64b7031168ddfeb072c136e21b8eec57b2742530443ed63f5c
SHA512c7acf6c6d8ec64420bde62123185509776c5b2a5866c16bca6b55fe1cbb389f02391d22c6e6d0639ea283a37f51c260bda175898ac7f30fa92fe959004d8145d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d4024df71f6a42bc962ad7ab66e8f5c
SHA11e06a4a8a75d3fad44d1406aa01aaf428d60aa16
SHA2563842b6ebb5f8c41e15216d7c4191b2d35bfd9f54ab700adee7564280b3065e37
SHA51221c78294e5470814c896fefde1be76026359fcd98011800f1eb2a5385706a615ca9cd5de12e19bc67421ca87a29d782799e683ecdf2307ae33264cf4f6f04159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581c0c0015f7603929c6bbc1970e00ea
SHA1a8b8051fce73ca62a29722d2be138cb85a99a867
SHA256bcbc71443d98f829402e11e7efebc231df538acf4f92886cc26b2b466a63041a
SHA5127c1a1c915b1ec455447f2066539da6fdb0473dc39d1d4cacf50b027b4775aa20677440be0e27bd0bcfabcedbd9ce2d96771f55cabcc2ce489c56ce7695fca2d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04c2a009c8008dfd7c651dba58ef166
SHA1e5a15e2156e442dc461ad2e03d77955d10872a68
SHA256d617a561eec696ade3d6f8e93b4e5d3c3c9dc2c7087f21dfd394d67c9aacb368
SHA5126bcd915d9463a9b631ad3965b132e392812ce255b2d477723b68829c4a9daea15ae0a0f107c408b13d5d014402f63665e06a96d73acb967f3369d0f20e67001b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d06412e8c0ab627e2888d44c2ea558d3
SHA1ea989139811eb8c70d3190da78cb1d49cb2bff4e
SHA256ec3df07b024d60d08a50b06a1dd3a641adeecfd41cdbbf18ed6f3768b73b1ddc
SHA512bfd06b8e7a6fa00ae88c1ee2c9f875863447d6e4e96e20d35d8ab31ab624844b6a46e1843f9c02b018f1b4f34de6b5bc97aa2a9d49951e227429382d7f78d120
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b