Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
85d770e6f96342d02934c1da5337af17_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
85d770e6f96342d02934c1da5337af17_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
85d770e6f96342d02934c1da5337af17_JaffaCakes118.html
-
Size
6KB
-
MD5
85d770e6f96342d02934c1da5337af17
-
SHA1
e4721f63d8f8353eeb3d46b8d5e8e3499a78e6e2
-
SHA256
92c9f240d88415ccd7ea7fb9758025092216e371f02b283dd8e5d82c790ffea3
-
SHA512
aa6248447a981d8ba1d1b7b21e901362c37ef699de55eddaf355005963ba5f0eb305318dacf2079de5bff98d2216f4694ae636febfbd6e7b50b49c19907b5403
-
SSDEEP
96:uzVs+ux7ILLLY1k9o84d12ef7CSTUrZcEZ7ru7f:csz7ILAYS/2b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000000d27d4ff6c77f0df3ce6c92a1c537f3e1a1bac1d1b4ea1882d7d986ff73b3d96000000000e80000000020000200000002ea24ba0fb31c7986ef23573ef7b81711e80a420aed3ce86b41df78914f047e6200000007087ce862777a1b049f4023680f31149373b737285c6f53953d3cd5059599a0b400000004a28ee6654931eb74bd4a8ac1bfa34b6e705873807bc4ca575c593d3b7d767920edbcb2a875a82168b67a64e34d836f1398c60ce539562ae9709a69dbb362099 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429450335" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B57D4271-5709-11EF-A248-D2C9064578DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3007f58b16ebda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1832 iexplore.exe 1832 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2100 1832 iexplore.exe 31 PID 1832 wrote to memory of 2100 1832 iexplore.exe 31 PID 1832 wrote to memory of 2100 1832 iexplore.exe 31 PID 1832 wrote to memory of 2100 1832 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\85d770e6f96342d02934c1da5337af17_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d59fb7076031fa087a2bf3eea5e572
SHA17fda16674f9d43aef14e09dfa96e3afdafdbd277
SHA25675b8529b5b72691224def2d423dc65274610eee1b93afea552a5faa80a910d9c
SHA512a0212214a90299be90199dda30b612f705fb6cc0737662f7cd2d6a147153677485c2501b745898f7c4659e95b8f4cbf021b649c38e531e9f189ffc353d56774f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce756c38a4a89e32e455d56bad7602a
SHA1accb9d6c308a4ff8dd2207e5721e4c9bc7ab0c10
SHA256e680d223bc28bc310c4c529fd56751c685109f49aee057feec307ffa9aa6cb1d
SHA512e7e0e7f76b42b61c12dceacd0244d05409ff73e3bcd44f7ed4a057fca5e8215fed290b38ce01ffbdd77fc99879f1fb6ea7463ce540bb2150584322e5c04fb206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c75ebb616c5bdccc46445b7de7bb41f
SHA19f6987a47e8d431bf8c92eb5a8c89e3b5b0c67ad
SHA2567246fba09bee9e03492ed2567c0ac4d1f68353588c65766fd2d1e51735e53e03
SHA512ed995267443b8315c6fc85959f1e5482fef7e5e84d0ab57121ea474cc4a6554d3b1fbb0eaa6380141e4666e881e9d5265da23557fae6a91729ae23d9189a607d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc55c0734c574c1cd5c15cb32e69b67
SHA12899311f4a3f72606ae41422b8e1115f86db5b0e
SHA25613050da1ae3a9ab4d87870911a7c8a9bc7519ec411a7dbf5edd0b8a2ef902727
SHA5122ba1e454a7dcbd91d1ab8292babd3ef47773cfedddb5afc2e9de92ed6d992b146723fc2f28b7147a051010ce54a309214ed2b0af9fa5a64a49fee27de17855b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a3fae4bc8310005c583637fe57bc9ab
SHA1e9daa5d1240c3429e79f915976fcb13afaa54222
SHA256271c32e62a8a785068cec6a8750fdf4e2daea1d00f70ea716dcdb78bb7604884
SHA51216ba2e961db27e0afe061395efb27c9c1926c2ebfc3d7fe9c3900786ff1842097c1ee3fcd9db6b02bf33ec406d6451c830b1eceb24b48cafd0670d031b579c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f656d5c1e3de1eb980bb98895b81852
SHA1c81757c4270e976bb54ec5ae0cebd7f0235cfde5
SHA2563c4717bcb7140771a548748e17e666e7b0f99470390b8cf32fb9158d01421792
SHA5127be25df64c463fa77ff75b7b8c50cb7f51a4071ee9bef2dacdfe7ad1c575e6183e238ffa06af89f5ade0828a19376e329f4242e0eeab4a62ca484c7a6391f23f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d8168c0e01a95212ad15b76195ccb3
SHA1936d0dc71e7a672fa99e9fd1710cba85c802d204
SHA256615dd1bf5bece5457a750c37c123ff6daccff8832049f60edccaf982cdb1aa34
SHA5123873fbab6fa5289ff3e730c37cdd3a574776d9a6420534bee48aa01452d93d2b8de5ad12580214cefeb5e2fce734af683614b7aa652a077ae775b6f19aa25f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8dfd92bc451c423b792bc017d8dfb4
SHA1c9f0f22af4694317e143fccd0b01ab3c8da5938c
SHA2560b5b8abaea73ab847bd26fe3209edb3c4259734b99124e681458d756f9590960
SHA5129e59643be7d10472cba138d4806958df2c7c80b395c7f56940deb53f144d0083dc2689bc6fcc756d22fb368d9427ab8ab6da1f0a7aea7e72db0ef3f4c96c4779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56cc19a00c77786ab299e83558b5feb
SHA18934cd6490dce6959bba07a0d493306a4fb22f43
SHA2560a17db37e308c250c736cf309c30e29ca69c58c362cbd296fafa6ee57c70cc39
SHA5122dd67a2b5d1c10ad2a3e988c6562ba6c68dcbd5832e16d42e1e61ccded2ffba365d147618dfdcfcce3e26da6e0134027b32c6491604acf587deb43c577dad91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5565bdcc77dc9fb55f6032daad8478532
SHA146170ff9a0e6b5e16f45e388e148500ea6c686a9
SHA2569b7dcd04a6d4c41e04a8726a87460eec87b8b7174bdf08320e61abd0829d7e51
SHA512c5a8d6662289743bdb01eda927c57c81f2c9870b644da85527ffa2469a3bc7992dd56c5e378fce6fc80f0b312c25d389b6b0ee06ff4e11429e5a4d0ed2bb248f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c23a9011f9c34a5f683fa829ead41c9b
SHA12ae92147e8e387fc05ec26fcb5549561012ea8e6
SHA2567f3a07bca89d69d653c62da09077eb9258cebc0cc15e727aaf26de46c0622927
SHA512bd20c7dbc364f7358fa16587fb2cb9a1c043edea1bf99f965af10c2f0f1b0770f70109f02feabf1848b5b21dc88c3ff3bed5cfca60e6527d0face0cf7805f4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be8b6c5cbe062beb9d6bb76407cc0af5
SHA1b5c5b9f2bf982b6e9954aef0d27b90f5f0448524
SHA25675bd1c98bb91de9aaab4e1c91f000b5e532f968e4b0386524498caa0498f19c3
SHA5129b57b56c907aad18526c31fcd0087e58c0835b46fdcc3425dbdcdf2d708bb5e8317f05f31a061288f1d197999f75beda125e66fca941442f063e365e578bd0d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58862d3a65972195b64687d992b6edd22
SHA11723b333145be1fa481085bec68187c16bf797fa
SHA256752da16428a0230cc8d436bc869648238903284bbfe7c0f10e92e0a28fa0626b
SHA512dc2d5c8524b2ec2c4433a5f5815f609a1d54ede0cc9514fa5ea47441bcb5cc6dda1ea336aee2fbeaca86bad2e3a94b3a72bd82abc160121fe2ea74261428cf84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9cbe7b12e9d7607ac8def913ff48a94
SHA130880deaec2949cad458e355bca29cc11d8b062c
SHA256f25eb80b709950304cf319f90c8774b60559043577bace15a9ff7aae020bfc9b
SHA512fee86c647e2096e53cc0325cdc6ecd72713e4f22c29fdb675d679629153b36bfc68ae84aa8f2307dce6abea5916ea38bbff2970f9389a2fc19d86dc78225f78c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581237340e7fba52e8eeb7e3215ba5b1d
SHA185106f4f1ef7ca8eeeefa4c5ccfe27b7ba5e9def
SHA2569d5e299aa08f0765f846fd11e205772d84e60fd08a3d49e932137c35d0002be0
SHA512806c491a75a4c1d3f3cfbc6229adebcc69b3ed36c8663e5a57f7950c73793e59dd21a033c9b583be915da8ecd34dee78c0c4f9503ab0940668f38185563ce302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7e17287c5473ee3e929a31bb52eeb7f
SHA1e2fb2e6d85d8f7dd1dcb722ce52f6aebd4e40ef2
SHA256e24679d5bc650245dfce59a90de441f3a34784d0db10d258ad0da533e1ae1b25
SHA51254832a33960ec1c1f58124e3a85e8760927a098553337255c8f58f83e49103bc2469ea8af0a1edfa755fb933eb014b46b35bdaeb67e872e827837181812c7929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572960fac5a1e0d579f7689b05207cb87
SHA160825b6b87b18f76693dba33a479e6c571cf367d
SHA256f563fdabc2082ca4f0062b901804d55d5f9d205be0e7466101e595320975b260
SHA512e1358d3143a05a56654aae9aa509d0f90b4989106090e7b12ecc220c5270a23a52565afdbec29006bed16462160fb52ba3f89c1c14f3972c05a652909975be48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59030c1851ffe6d798cf1ac47603260fd
SHA1aa738f0e5b62725fff3ea2a5cd8323ce09737d57
SHA25682f7effd42f47d0d14a2cd2a15ded9095748fa141db2057bb141d6b77b9f25ee
SHA51221b6a6c5a5aca3824672a0bdb331f9edb6d363b585e456642fa6e98e338da490f5b4d619e4c9046ffd497e998fa5420a2bf4b778e64acf80d845a32578f92791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5197a3fec660438251c4b3910bd2a3a
SHA17af745763ffea1e6976f662ea232b8281f3dbe4a
SHA256e0e1207f8aa226ee93bdd2848a0035a7e9a2a9159a6063cedb99553d765a18a5
SHA512c054c4b25982fe6708658d37c8899ca6f3eb9f723760e45d8d047a0959e2cf90ea1a03e464068aa3cc73a3a32e70914e65f9c09ccd4afc31541fc71dacfdc1c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b