Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
860b849f72386857013bfdd964a62b57_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
860b849f72386857013bfdd964a62b57_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
860b849f72386857013bfdd964a62b57_JaffaCakes118.html
-
Size
17KB
-
MD5
860b849f72386857013bfdd964a62b57
-
SHA1
fda5a4dafc7168d6a3faf560be23a5ec493afb12
-
SHA256
9c6077bf0b509e554ff1fa785e8c7de49050bafad2decb16e6a7b31e588293b5
-
SHA512
1ec109b3711be8084401095e1a22a911376c23e6cf0a78c9be7233cdad2cecf11cac790aabf00be451aa6dc22cb447ae9523a1b089fe82cce90d346ff7a12c0f
-
SSDEEP
384:LS9PItv4PB42xCPjJeKJzr52T9GYDkuTSXGyoYUnX/D82gjdtKNQ:LqPQgPWg3RuXGyQb8/jdtKNQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000a58f1125830eb11ad04e75d95dc5e390c4cbb9a937de4d6d87238a00377db710000000000e8000000002000020000000e94b5955f57783443104b362d44cb342bf74fcf9cea1df450f53021c32ea4ecb20000000d9094686345984ed1396453866f1380cbd5422a8b49f146c10b0ab7f207196db40000000e30733eb52a60bc9915ed28a2c600ececb56b519924dd38174bdc0aab48214b7e87672f43048f3d7c53cf971ef3447a0016cf7d7a01fe2324d63710854637778 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b3ea9820ebda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429454656" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4675C31-5713-11EF-B9AB-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2080 2676 iexplore.exe 30 PID 2676 wrote to memory of 2080 2676 iexplore.exe 30 PID 2676 wrote to memory of 2080 2676 iexplore.exe 30 PID 2676 wrote to memory of 2080 2676 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\860b849f72386857013bfdd964a62b57_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df67b8367f1dc3bdc977b97f2e75e8a
SHA1a740176c83bcaee9eee9c65ece5cfee0f99f90b1
SHA256e4d04bf92bf626a6520a867226105e624ac5084789069c0e741314b0cee378f6
SHA512ec7be149ee58ea5ffa5a3a8ab74e315c3fe7b2949a27bf7b5abb362d03b54e5da987c3341ab4141a91188034eb6eeda820fa140c6fe8724efa7f32bbd6e2b9ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a46ef970988733658e70ffd2e398b6e2
SHA1cd51e2e0eee019d8c69b19dbe00684b69274795b
SHA256d5267cac8f9f44d651654b9a68a24c452a41468f3782d96d4ad6b179885d1165
SHA512924d6b7ee1e6f6ac261f3a80c00a5771a1d53b8fd0d14bf93c1f28ad676c0202a5843f9f747cd06f4e6a4413bd926373c7dcef825fb52ebd5c158ae318f35a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6e000154e9cacc567f7970afee292cd
SHA100b80379c600017e691c5199e4cb5719c91e82fd
SHA256fe2a505d78c21b38cedf113864efb2c404f75771463fd3934a3e7999edc9f6a6
SHA512d6e2bd22a2268f2085dfac19ae02e6ee54555cab7fd92dfd51a873eb73fb28dd615673ca26cf326a46b53c443bcde6f36a5aa9e2ec690090acbfcf7997ad59e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580cbc17b405d522ecbfd9a5588170dd5
SHA1b70477e47b87f6d8bbf74a83bb4a0088abd44e31
SHA2567757da954df64040f4b18d0680064973f43fcb8f554d628adfde9fc94c06ccd1
SHA5122c3297be872ca954f2c52053bad13f49d99f7a794d64f41cddd74f547be1579c531c0b02966ac2700c3e3aba8472434a8961a69700df38a4a61fd92ab06429cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee4aadbbbb0f8dab742122b65b07364
SHA13096e7d2667417fdcbc3a56accb64ee547b3ff8a
SHA256bd5d47f3d64833390a48489cfd9d49ff4024d2d09c03a67acbe1091fdc828c8b
SHA512ff42fb4b210c19947822aafc1c80a2245823ac72ab22f84c98f902748f20f2522d0c313ab76c8c97487aa63f218095cdc0fd792a2c140039bd3b3b82c7c65500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b7fc439f976e4103e85f56a5a58639
SHA1e65dcfd1491533a82362e790784f2f8bf1adf300
SHA2565605272c6acb32af713e538e4d687ec0b48965452230d9ea64ad10061e58164d
SHA5123d50dc161feb8ecb8ad085e2c8c755fb351212029127670ab793f66e4a5a600661bdeb4a54df080a41e21305f25c82ab8096a47bc04a6a64398ceb747ef1c249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577777c75f386d8b93f90f511fb9b54a5
SHA1c3920320e660397cc52ad9a5a936492f75c97098
SHA2563318a4847b166cb5fe81ed6aec6403f0a4cf877fa42aae0ffcfda67223b7e0c9
SHA512e103810a20e11736629eb118bb785bc241dcb0835ecb07b5f2870163ead3475103413b47214b7e22dade67c29e574f42e1baade6e72adac2c08e0309b0456f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d35c0b080784821e87d1185519d9ea6d
SHA145582dcc24a9e4011006887bee4858279f4c1294
SHA2568af90b4be4f4a1a4ee639714ad650d7d2095d822ef9d92ce7e2069ba33a08815
SHA5128696dab7f4667bd4065fe3dc7219986c85d5e5631114524dadf9a9adb6ad60c43a990a0e58af90fc39095a9a6ad0dcdfc0e781a4ce04ade6b1bab04d38fee3e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e9e096f9246ee69cf1f876231489d50
SHA1183318815cce1feeb8d70d640c2801e7ff1c05b2
SHA25662921db17bf3c7dd6cff7b1e4030e3d31b9001027bcb0e98b4f57f8dd15111c9
SHA51229a61a95c3176a87ebd747b380b73b9c9101cb7173158e44a90d52805a51f643770145026aa8089fcbbfc0c2ae78e813d8397c8db99e2744ed85fbe0d5d7a5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a8d0a72f9a6fa30d8b7159b126602e
SHA199e2b01879ee27ffc4758b2e043e9e5de134f1b2
SHA25635e7967d21048c8f0a73986cb8cff70206a1faa868080a15f866ee13e7b57c12
SHA512f55723ba10de548164695d1f24237ac6f4a9a965990da51322a8eb0198ad6c3f7c932f824fe26ec466406bf701e222239f09dd68affc56d1f75a47d853555810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934461fba1dc7145eb18a854458455d8
SHA102efebd2046ad6a1f0605057d31321eb17e87e6a
SHA256d279fb7bbbd1318c8b26a01093e4196719346dbc0d63794aba7247c8f57739ca
SHA512d04bf2b05a1823a0bc8a553d115619f28558d707fba9c5766eba51d10d7016281494d563dd238eb4243e3b925b2e8f5646022bbf9dea7abd76a3d24746386224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5848a5ffd2d1efd2432b6ca7fac22b911
SHA1a9fa987369d19b996fb3b6f92896b7a7952e2eb7
SHA2565b1d1efbc64b677809803ec167d16846ee97ef2a639188878260bb7b966b0336
SHA5123763045e2ef852432542eea4c5c84e45c7e21fb4a7c41fc8496676bca17e91d7c963e11546d82db1f8368cbab0309b3a309379e207b53b841d98c6cf45c5e414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae758aa55ac340692396389c9568d733
SHA17ab569280c6c3000f6c1a4d9b47061a72c7fae8b
SHA256bcf686ce69f56f0c5a96e0f1feb255b95a38bc056bf5254c6efd3daa0b44eddb
SHA512635cf4029ec1a891383017248aaa73ef76234502610542e4cd3cb60b7fb8c904ba18a968dcbcf2943d877b6efa7518151f7339bdd2cd702dc00ac2b47ff102e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5ec7ac7975d81cd2fff54b1549c573
SHA1a26524f5522da7d3f5aad7a5b3c1959715b807e1
SHA2561ef92150289d5cad0cd5d6659ac1f8fedec3c164cd3ad0cefb8abd982871cd42
SHA512b5fd8b716af4f3ebf335bca64eb112201647895b94c997253fcb0e270fb8ecfbffe44ef637e04373bb2beccba20b84a81a54f3a68536e16ac7d17b9d32fe437b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7a59b07a372ac3eca6eb32341c602e9
SHA1475ef6e1e3b6a089c9e6a1f25984e48c7b916daf
SHA256d64fbc285297ff91bb45dea7caeba21ccae9d989f32d637b391728f71b3f6ab1
SHA5127c69c0af6fbeb0481aebb70bc265cf9d732aba3bd6f4828d3792205543583258e6ae238a55598d7986620dc88f288a191817fc95cf4363f644c2aae9da18a4be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542bcc8badb6d32534e15f963060add09
SHA1d19229a58b7ab4c57c35894948f4a80c176f5f37
SHA256e69a5ed8ba87a99028517785cde84c1d240bf6f56e4c625f6089fe0a56c4587f
SHA512d36dffb1dcde6ba83398602c27037049f4b661ccb3b7626b315e6331f317d7585f9ecc1ee98dba215e64331e74f766a47d3482a6e01298fb83217d02676efe9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9326e26c97ddbc6e4562d36f737b529
SHA1493db600746a247e6aac1529f10ce28701e596e5
SHA2563df323477d811a1562813fdbda27bd0c30ce8378633e4f84dd119417e4726c2e
SHA5127e121de37bdc187607766de5f31cc432ce41b5c9554d0f0351e28dded1dab048bd329c8a2fbbb0fcdc1a12bb4e435717cdc1ebb49d45de082e3f636ba61fc458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5777ec0a6bdbcabefae8b7e3e26855321
SHA187b2cbbf3be5e319cbb8e648d6b0b2e4ebe9d991
SHA256880b921f1ad21dc3ac8433b5a9f4af08f78794cfcb4e433b54c84a03590ae6aa
SHA512eef3c99a7852f21673a74652c322bae196902e0b7fc5471c19b2ca0904c61cb5943aef3b1313a377474d19f89c2d44f361481a99557fa80b0286aaf23fc4fd96
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b