Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
8615062967bc10f953d26660bb045693_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8615062967bc10f953d26660bb045693_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8615062967bc10f953d26660bb045693_JaffaCakes118.html
-
Size
23KB
-
MD5
8615062967bc10f953d26660bb045693
-
SHA1
11e6d19b8c6399e3836f9e0810c1957655650c12
-
SHA256
4e0519e705d112bcbc956cca519053e02386d6bf8113b320e63099629569ed61
-
SHA512
b617359311c456a49b69688a305bff3cd82e7b04511d92fd9a3670915c9a14726eda4be83633ac6667557258e6018bcb194b29823b802e6a7084a2b64b7fbf4b
-
SSDEEP
384:igic8hnDDs4wgaAewevu7HeoLleMQge/ZHeoLleM+uQ2yH3UyLEuUMzC:igic6DYgaAelGTeoL/dedeoL/RpXyLEB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82463681-5715-11EF-B6F1-C644C3EA32BD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000ff0c23835f39a0af8dd2b3d891c675f86e64319f75488404cf192389fd3b9f36000000000e80000000020000200000001c67c40f4d2f7059f56aa180d39fb9a0eac75abe1810b1f3533ec2fe0933077f20000000d705dc1920b39ab3479b867a88023cfedb32a9e62ffffaec11fe7e98473bd1ac40000000e37dc97ff56b763c61e647dc16331af0ac0067f5733dcd929172a52a23a2089f05d9dae1393d7002050f400f771f33c2d4214c51f1f311923b97996b22792f2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429455405" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d7a75c22ebda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2408 2092 iexplore.exe 30 PID 2092 wrote to memory of 2408 2092 iexplore.exe 30 PID 2092 wrote to memory of 2408 2092 iexplore.exe 30 PID 2092 wrote to memory of 2408 2092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8615062967bc10f953d26660bb045693_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54c4d9235df195d028a405c141d830568
SHA1da6ed7ba7479b221674b455b036f3d0a84f853a1
SHA25615cf8473f5519ba88f81a530ebf2acbbbf68666fbb96a3d6ce04c1ea3d0cc43b
SHA51284f4a9e834e0a103e435a38d9ea692dee695187b591a19084c821a39944e2cc76e7ffa0a3011f700cde3b5171002c4d190ef5e422502d612b56a73c68c145c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523eebc2586249f3ccfce8a999ede47d8
SHA1644f017397982290628dea0c7067f084e1a828ae
SHA256b05098ecef970c1787455c5f08b45b6baabe7785c8180ede73ad24815944ab15
SHA5123a3a49b7ccebc1aad2ea3d7c3172a12a1dd4800935e05fc821d5d6f0a56e0815662264969b8000120c36111e0c059a55f926638aac2fbdc031108f50def3c63b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aea6c2b16c69c70c6825c3d6c9f1a56
SHA16c8b21a2dc1faed75bcde56eb40aba4a34c5a579
SHA2567d16db2ecdb6c87fa84bc56d5ab52bb475da8f788f4723a05447b7b8540859ff
SHA5123c7ef1ee8e6cf3585ded650dd861c1dd3b78a71465a907d4e9de4fe5b2c39083050eeec15c1103a17bcdf3b4a6e3a9cbb6b994eb56a1bc9b14fb9bd64cb2eb2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a6a29b0f2d60f1bbede261d370d07c9
SHA1fb9eedf3a05c3366a2b76f7278b0c9bada91f6bb
SHA2568204aadbf6a21c98089f65308dd9dd6f87c12551409f8f567054d03c3ffe0cc0
SHA51221e0320c2e07120b72509d1f3cefe9cfb6246e0165d01e3cd04c968988d6cbdd4af2e6597450b466a95e65a0863e8d64e77a8d7b1a71c0e432c9fecd7b3e77bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcee6c807e7983fc3ebc80624ed3136c
SHA1e8896aef4ddd7031ef13a33ce36f823e0787f8b5
SHA256f3f85a13783b6dd6a055ad3db96a57db3da744ba7eff273cd3a58f794941f3a3
SHA512d94ab9d05149adc08e92a942eb20c94724b4047bf5c858278a7d17599277d8ccdadbee554c6f7c43aa1b61bf6fd9ab58e1033658914a9545fc0b67265b297a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3705d62750ffce1ec03e5e89e98c37e
SHA1281c758f1534ebd6e10c4a509f06c4854958b606
SHA2564c6a810fd7ef7372fa3b2425bbcb9fa2f41d2f7727f5198ce07230a5ef654060
SHA5120be15e15376a3cbd1d84868c52f1b623f306aecf9d9d4f52929801e1f2b2345994e37afeaa59b180c884e9a1912a2b96c65d7ba05509da6b2b95194a5ec5a4ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a163f8df4370fdcd008da9bbaf021b7b
SHA11ddaba568e29d59f3fdde44d03acc8003ffd8020
SHA256c01c1149d8561e6eaff8fe6887a35414be6b2eb567c4e51410f3b2b3cb23d972
SHA512386ff1816e60849fc116e848ea88e4373c1aead3661bc7d1d98b23fb24d292b0b16f0fba20756278822873ea9018ee97027d0a9ddc730f7868070a96427686de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55996ab0e3b7c13aa49be9a1959e8eb98
SHA1cffb1f60416c575ab27c527a8ea2c9392f5d0f60
SHA256628d86635dc8fdb9dad8541f054b1377c8a09f9b3547a25a210d72fa2ad34de6
SHA512868e2108fe4decbf728c2f21b3683288c00379265d03758ac65ea1a90bdc1c7ae6bcf4d969468ca38d63825ed6aa41abbf9bcb997af953ed9037f0687cf85531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a64ff83686ebd45e9ad95cb969ef5072
SHA1fff6918962b1bcd5e8daf7023b2a0ac5c12d4c4d
SHA2562e4820cd330ed5d79c266071f18404c48d4b0d0b69f9cc0d07d82531eec7ba5c
SHA512dfb7ee492550c04a96cfc31fdd6558ad3c3413742d89aeac15da095c58b603b44746919b81cc364bc4eeccac73a3712c23003aeb4d51b64b830933170b756f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f8c47e9f6f272889345d38eaedae96
SHA13fd2f268be9c59ca60b88f6112271a94a5ce2ca2
SHA256d8cad7870291a5d2ea746fef6226bfb0b79ad6f4a7826552a7322f4d35fbd523
SHA512188ab2ab4caeb68d00b3343143e947f57878fecd85a871fe8f3a1b6ff077da1b7e25c69848e32d9cf4ea0e9d53e40f037b6913b6e53104eea9051e9ac376d024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573120516a832798e62b8fc9554ffbd7b
SHA1fa299bfda2dc7a19c08d58cf59b04a563126b449
SHA256d43471a7786af711bdc3a8eff9ff8c987318575a50e75ab2b82ba439dd539744
SHA512d988c3514e84f296cd2b2c58226040a317d5d9535010ddf031a2aae185934570b7e13b4b07a609bc9d6eccafd89df272306f4a455e840e51e5773da7be2bbf40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542c76567ab6329c29ea605094768c590
SHA19b4e9b965e5ed0b76e7237256f2077f8d9d2339b
SHA256aa786c9aa88355f1eb8ce645c93d20bb2698abcee5cf6d813672ad744efb2420
SHA51215376c2eb567dfc838e0e101024000107755ed30b564e11b93fa0a24940a4252174affc987f70147a71d5a4d8e172e47e90b24bd6b08c51487ac98977b3666de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6dbc035aac9668f7f1f6c02509e9870
SHA139277fbb3ecc3824377f1312824a32b27fa05c97
SHA256fd8ea6f4684433cc913c86c7db8147917e14af21693b0b53694539bd9768b14f
SHA51263d03fa34f83addedc6b398e186dc59d74bf7e542b891006350a5b08ba6e71b5d43bf82b7fd2bcd96698df0e6929b35489b36bb955ea461362375b17fa178a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad075888466b2300d25e08c84356585
SHA1acf5764b0db7a37f577462d40fb2dc196c91c8db
SHA256d859e435d4e2fd99c65fce5e8c9700fa2f22b7f13d27e62973384ccb00734a9d
SHA51276a10cb2bc81272e90d9e42317a6bf6f3a063e73ce8d6ba65433acf7c9adbaa3b7f31b9995a7cd9c290bcfefc17a7a17751ee9e1fe3d5bc3d1d3a1088806ddec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae58294f193bfbaa5d33edcc9ded409
SHA17c6ed3933d73371b795e9b5434ba75f4a43f870b
SHA256e25095f63820402ba809375f9a099d39e5233c2c855b016dcf5178470adf2a48
SHA5127ba1bb60c760944abf631a049b65d7f2247e85f7db00bd9c5061d80813b028eb3bb8b88f79780f163cc629131ed10e16899b9b1faca9e5cec1360780cc9fbda1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534f98ab47d95c594417b158d433f48a2
SHA1ed2a15067d9b48964ec4f7169d465f3d7a3c9870
SHA25678f36f5470ece4743c3e897d9c003ced2bd52326660e92215fdf9debc8d6fdf9
SHA512186ce2efa463c74eff8e897d069039391652c645482559742a584239b827267b7bbfeccc40181b95608a531150e93cb2b9e34dd71045e7c83ec0eadd81211dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59f06e77cabe1b78113023adad9d8a5c7
SHA15126d5821fb1d1b9c800c824f21802b0065a8a13
SHA256eecc8105ed593fe5455e3d71a2ec5172eec0c25e124f75a692fd7c23a30fa8b2
SHA5121345096c7b859bfbe6f43916e1700905a1cc685f6ce63d75744b826dcb15f548f85353328f43ec39d1c71776a780670363515eecc69caac623d210ad0de04d55
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b