Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
86a27e6e5362b9818bf24993dba19397_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
86a27e6e5362b9818bf24993dba19397_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
86a27e6e5362b9818bf24993dba19397_JaffaCakes118.html
-
Size
188KB
-
MD5
86a27e6e5362b9818bf24993dba19397
-
SHA1
1119a569489921316f9e06c1aeb7757f005ba33a
-
SHA256
485b18472f0c78443db4212fc8886e58816916147baa460863a20a3001e2a336
-
SHA512
59df68d3eeb8d2b3176d8bb878b168cbb7c1eaba283557017084571ac58ae4c4c578df135b36abd2b1589cd9444e34781daa75b57da8e8c7f7b10262b163f6c4
-
SSDEEP
3072:7ji/AnOqE4VJpa/Se5ipO+747u3qN5EqlFyZgMH/tgLM9oAuGcxu4qOvmrG7txmW:7ji/AnOqE4VJpa/Se5ipO+747u3qN5EE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1038cb2a3bebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429466004" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30F28901-572E-11EF-B6C3-72D3501DAA0F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000000c800a431a268f07530d5b0401a163a5bfef1fa1507863aec60c90801e006939000000000e800000000200002000000099f77eb95f074a907b4dbd536e5ebb32d510d1f42c59a6fead03325c6d8f5d09200000009798598b52cbe5c94f8e7f06224595db1ae2f0e94eddd59310ae8dc7158b01a84000000024d520c9229fcd5cf899b65b8c055b5176dfcb791107c32eaaf4999ca4b068a7330e9d034bf5c29250bfd16eb8359707f45a745383769571665aa5219ed36ad4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2672 3056 iexplore.exe 31 PID 3056 wrote to memory of 2672 3056 iexplore.exe 31 PID 3056 wrote to memory of 2672 3056 iexplore.exe 31 PID 3056 wrote to memory of 2672 3056 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86a27e6e5362b9818bf24993dba19397_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a46bc78754f249e57fa9fa6a86a50e3
SHA1bc520114472467bfb15d16057509be14ec8a8d25
SHA2564569c13485bd8efe3d28afe855425005568bed1143ccde7ce3e23af2ef454b40
SHA512300ac71ccd4e24c4b680467d9a3070bf6e6138ae2bc346db84eeb2ba365640929bb785730928e056c42eeb85885ac9859cfe3f31d9482de9b677ffc827efdffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c334f7032e3a425178bf958c19ba47
SHA1c24e6d77dd82117ff793516fa8b904023c9c18bc
SHA25606e93a8223fba975f9c1c217db04dab61e2f4b6b003a2e771968d3ae4a3a1eaf
SHA51252588d06398e7e43eb13878111672c1ec4358700fd3a75f68c82fef7cb36555c047d0c1f6b18f7e1b262f519856d165bc7a37a76c3e6988710f23ad3ee64e67f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbd1ba8602f6ce632be573a39026ab83
SHA1b4d9b25669368003bf16342f263416a62e0d2bb0
SHA2560633e84326790aa18672d251d77394919eaabddc08f95ab6528bf9a0417fef5c
SHA51258466188dcaecaaa7ae40f8c9b8f1510486c73d8a5eddfbe4b664c930bb172a5055145a694dabccc43416775c613227a141a80a3dafdf0c3f801706806678a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfeb92cd5c4390dc7bcbf81c99f5b911
SHA1c623e13a20715c2bc9aabc32c631c77488441625
SHA256fc6067eeecd8d7f4c4cf18fb6b995dfb6353daeb19c4dd48d9545c5b7f6eefeb
SHA51218b526c6673b3f7344b61b6e11bf422345874542f59ef811e287e59315fcbd9f3f958aea9611103d8ca226276eced457e8fe70feb7becea6c1b540d896d91e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f8a8b355c9c33bab898feb1f51fdeef
SHA1fe928d9a99828523af3b7b940066a295202f5f04
SHA256f5600ab2636f4666775fca32b3ab2e05f84386ef527e4de44cef290add5e5cf9
SHA5126779bfb5fb3a46b7b5f4e7f6061aa86b558e9d8906bad8acd81275960d055ea421f6c32cee8ba7647b2dce4fbe7a3bbc956930e50a16271fc7b632324b1d21ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581dd29f8bd9ad5a536e2e8b62a6f0bc5
SHA130d728cedd26db0b8a81b066aeaeb1d528c800dc
SHA25624a9b3a1176912422407ae90ebd98d64f5cb66406bbc73ad0caae9ee0f9d2703
SHA51249f9e1828983036b3bcab32d0a2a4c5ceb980dd9e221b1cf6f73385847dcb0c68db34e962763a55b6522132bcab0b8da7240aee671b5fbac322a1266eca1cbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51063c7538c0a74a977c6aa4d4e5593d8
SHA1a27ce5523036a7af450b981b5b476007577c9b81
SHA25647a7e653fee939d759b3b5abbc8dc35c88a302324e310481d9eb7417cc7bd32f
SHA512ae0d91f0b3b01697d391c49561779c8692a5d0112916562fe8f41c87a1ef2d09ce4f7d502f8f49cc18b6be11114a7b20aa0627e073d0133147bba335db670889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e83dadc2a1a4c7a87b40857e84c8794d
SHA1bb79c8888b9267e9cf843dbb59969600dc30d9f8
SHA2569a405e3e95d13733fc106641accf3bb4b9d3af6d9fb6fb4c5af9058ab4a53c85
SHA512fc165a11e51c28cbadf72fa93b4f6ce8b55f9405d0819c24ef17d82087af5a08336c41d3684796a18f0aadf42aeca09420d69602a450d406105ece67b99758d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f151bc8ba993d274aee4e50eeeafdb33
SHA185dd9a3dad95ad0218e5a90044d01bc830744df8
SHA256f936408cf0041a4ef916a6934df1c47505b9cbf85e57c7d6a41e7e8e3d5c7389
SHA5121170ae36cffd140ff7d7c2f5527d2ec8d7ee3ba31cbcc421a7e1b838d741ed025049b51cc28f4ed639b2c3287e23c352be6bfb5aff777d586b4a93f212a2b666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7cb90679ab3b0026de9cd2ae46bd0a3
SHA1ad6daece217c71852d98ce59f3da1cc680f5d8d1
SHA25674b7f707a1ef51604bdf38d6ec94f45198a70fc17e9c2ab9c23a9da87746b5d6
SHA5121b9b303c689a9628cafaf81a5d7485d4b033d4a5062c2bcb353c9c36ebdffc5d9ad983c4d9f4ed8d9d30c1d3e87778c6e2e5877540a684963ba16d3cd564ae3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d72e9cd4fd3752658a99fba10fc88a5a
SHA1e9a804bc9c34ef7338eaa403fd9e57dce0adfa8d
SHA256e33bed658683d15450586dd5e144f2705aa607ef6eb3396b67ef8d127b032434
SHA512b8698f01647b3955f23af1af1f98de81aed72a6ade7452dd71f773b7682db54af54d909d96e85b60ec437bd1793748d2c6a4e5ff4e81d52197dd72be9ca1f173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5937c0fef59fad93070458fc2124f3c5f
SHA193f8e1b0e219e7778b36456c8d005b67101debbc
SHA256c2dd17713d4c79f12e7febd055458cea0354b44a9da8bb5d78330802a580b1f4
SHA5121d4d15534893abb06b558a7cfef691345b0549429499e0938450d7bd1de88207aabd33dc170fcbf366fff94b401dbbbadfe507bcc032580014c82e0e5c9e5ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3be707a2d96cdc42ae5a9a1df07231
SHA1318a814617092a67a67a85aa8766329409e491bd
SHA256906b87a366594244ab7973f2bfb8d3ddc41ee7a59e782bd7996b676b01f74489
SHA512f112c76b034f23a697ae6b545096139cd15b5fd40260e73483b6ac14b870d3c8613c17f46270219755a250467a79a4fc3c765a96774cb439aedd0bf83f66c871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb81e336d43e813bb574cf3e7e768a9
SHA1fc021bbeaa0ef9ae9bf2513bddc581df03f9f18a
SHA2568e66b5f510493229d8644d717794695c48f7ce39b8b364ec3741e353ed725e97
SHA51272411c9fc2df2f9b8795eaa9f8fd8ad5dd179a4d0580b4477249fdde57a4007fe735ca097bf25fe43be5e6bee26f405f41547109b743c49d1176dfabcf592b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f2b8765c21d8c49845459350b583b51
SHA1ea7175bb9ad5eab1758060c8831de20192bb331a
SHA256ca58b9236377775ae4087a0d0314cdeba64a4a6149d24d4dc3fb8fb87a10418c
SHA51259ced1edce2a1d36d5a57c0923c51578c026040d494ede97c4eec45a6059b821cb3e7b6e23e86ddcf7f054c2e9ed6d2073612f8523720770a238f1a43fc478df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61dc50700fa4a774e1427e23b849d81
SHA1c12d7a0788d3575643972f5a18f336861c3e1c8b
SHA2560125608247015cbf2b0a62c780234579c173f4f7381fd4b0cf49c38abf236fbb
SHA512921e5936047838f9a74af582184b4ae9087ae8260711823c508f3d7d937a5539c98d90da63f6d29c2e92396139070fb3325832579ffa8e729ff0e454ab41af7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5126f5a3c38bc49a595beac640087c54e
SHA11e16ece7bddaf0b89c9eba083fa06ced09092929
SHA256d29133c55755db34887262a91d873e9ce4d4d0ef11cb81d50fb744111c7dd21b
SHA512c422134530551b7a647385d883a4dda3a90f8c8a25099999bc4498d0ec8f82da261a5ef44fa11f62e511fbca1a27daf7337968f954f033c26ef665173e0017a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779f5a7bd22e02c2d48347ffb57dac36
SHA17e2ffbb277e4b5087def7cb55ff0f9b39ce504e6
SHA256783fc54a1e59b7c22f6ae31f127a6799f36c02a88758ba8a4952a020ad6c7dc0
SHA512281a3cfc667a9129f5990be92276480ddd57e0fb9e55281975f494e70b1be0d7311872ff0f7f91a6f403f576ffd3eb8fb394d4eb6073af3f7556f9a820fe6b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5811a510e8e83ef968e9c63e59b51a6f8
SHA1b797ff3f461c1dadd3bc7567e413bc38d7752159
SHA2566924016be70508564b96f8c76c723b79c63992a51dcf15d124e89a1b853c5014
SHA512258cc4ceaff1651aabd94070590de474b305dd7d8742c4972aada7533407d7d6e6c74087370ca57347c0656ebe106b33a570c2942d6c7771e773d23aaeea046b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b