Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
87059f9b90fb960ea26eac85732c283f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
87059f9b90fb960ea26eac85732c283f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
87059f9b90fb960ea26eac85732c283f_JaffaCakes118.html
-
Size
69KB
-
MD5
87059f9b90fb960ea26eac85732c283f
-
SHA1
0021a94244564ca88ba681d93602c48e83815a5b
-
SHA256
927e73376dacbf2de00974831dfa2fadf95dd0764bfdd4ba4169576d12c9edab
-
SHA512
1444d602b75f9e34160fad9a94941efa89b18eb156997dad28bcdda20628adc983ddc5f46881e182332cde5c90119a73a1daf750b34c676c3f93d00b9f839ef7
-
SSDEEP
1536:gQZBCCOdr0IxCVHKOka2A5rjZY2YnXHOXK87FvilCewQU/2Bwl90OrFHYK23E0G3:gk2N0IxFOka2A5rjZY2YnXHOXK87FviU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429473570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0afe9a84cebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000c52bf524748c1f91e84c470ba53a0c7943708ce47305de342ef87c234f375385000000000e8000000002000020000000bd67d230d551cde87cbc95753f716854b7a45620290bd949f4dda5a5be6c6baa20000000960ad5ce7efa54f162ee129eda62783d484d3dc4fcbb099228129253a01eb45d400000000701dae9780b2ada4eae28f65fc6aa28aa469282af47af17555cb196a6db704a4a91990f0e58b086c135baa19a6618ae1ec42717407cb4e6443bb72bda4a8ded iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCE13C61-573F-11EF-A76F-5AE8573B0ABD} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1336 2152 iexplore.exe 29 PID 2152 wrote to memory of 1336 2152 iexplore.exe 29 PID 2152 wrote to memory of 1336 2152 iexplore.exe 29 PID 2152 wrote to memory of 1336 2152 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\87059f9b90fb960ea26eac85732c283f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD522569be431995e770504bea24b480325
SHA196b393cc44ead280869f4cbb9fc6da28ccf0d4d6
SHA2567bc6ee0ae2331a07d4e73ec89412ea58c831d21748fb83f92f1986b21c40c6ce
SHA5128cdcec64897ccc023b6b0c52e3a11eda2c39aa7d9f32bd5a8b5997cfe3f22a962ff166c674aad9a518adea91d7f7ae5dcd146f4fba3fa0b8a33b9c460b1ae77a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6e46b185ddd57351be52173a8eace49
SHA18c49037c93ca05245eb8b729408c69f01f0a7b82
SHA256d3d34e52998588aa5e00ef4b373327715fbe7ddc32906c3baace2cb592b34fd3
SHA512a98bffbb14389ee71921d75cdf65a44cd43912578f47019e543b0e5beb68da55bad2deb554ef54cf68ef39d3988e01f1d7dfb92032d9d0c747394d30321846a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52401ba1552586f02a43719e903c016a0
SHA16a10e926fd42b33072d99a18f25a57265973e2a3
SHA2568f1469ec73b04660897e8f839b838ae098890ad6eb3de8c9f05eaf5f3fac202c
SHA512f0564b16b96693b927641c27cb869ddfdd0df6140e95b8bc407f781bccd47f30a0f1859c8fbebd46af9aac69d9832d2744a190797ddbad3335d2e226f2efe21c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5545f2e63bdf2c4d383cac1d24d1b1baa
SHA171082fc4abf44dfd030eafc019af7301875d4097
SHA2563d9e1ee37aeae6b5091398e7252e79df75f8cc9982f01b76fb1fef27068c7707
SHA51243d52c25160ed6e0c6e4fdf84787229beb2f742c6a78951aed8390d0160a1ecd0bc19ef8cbcf74b9eeb9d05b537ff0501c978a9bcb6a7e66f017ed9d0629a4df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2ce4c98fdb40a4e98d10d74f962a921
SHA133bfe7147735994e36a57d7ed8b9447205efeae4
SHA256877159fa7b6a4864e5b72259a9a9594367dcef22da9c77d38843db9bb0ce2c85
SHA512f3abe76452f095b591e892d2e0cc5e36c374659f17c81933580886b8c70b5bc946075d2bbb8034c1fce7d8d3581233efb834d47251e1113e989f342234b8784a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215bd86b6abc4b37acf6cf2e22d21574
SHA150d9dd862f4f5643a41f07d88387a0f05b19162a
SHA256e02fd465c1992ab983ad823e079d1498725a9c8eecc1a24474954bda6808363d
SHA512033a84a400a4b20f48469837ac05b85ef1250aaf3b61cb257dda67f1ff0985302907a96ae673a927899b49c2d9da394ed9746d07d71256b19a0561c865d9052d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee15a0433c88a0ce4a8b94f69c68946e
SHA16ee2b2018fe099ecf523d03b84641e72d62b2d62
SHA2560c2ad0b2c76eeca2b472b2ba5715bd4cbdef398637e4d01f6156a2ac5a9208a3
SHA512ef3fbd46ced957222df2f1a69d0185c455443f65b30dfcfb8ba647be44544f1136413fafa6115e5011b5e0047a3b38b344c9fe9f7db195f5c7b05bde3d6ff058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a225c55012dfdef4c07bc8975ca5c0
SHA17793ddabe023fe5e5c59ebbf879c3a128a04f22c
SHA256ef92ddc11f66c3ad7791caf5fd7c6efcdcb26c5d59bacf36324602b2bbabaa1e
SHA5127d102c2c2158a1483c2fad082eda2b47415a5cf2720d26dc6a3d7b5c92ca1f5bfea59a34e44cd6574bb9e03f1df1eba9a34f0aa8d4089f76adc5a3b7928c4aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a57899b99606fdb913cb6b986a8702a
SHA117410da04b524d151e21a53924d9a2b688f630e9
SHA2562372e3474726cda7a0ae3050a249f367212105416cb78c381f03ce213f72a34c
SHA512b74e132a3ea6c07d9e97c0d7c742afbfccbc4d38cc88edfeb0d43d237257a20b87749d1dd96dec6714e077b75227031310f33ecc8747227d0e0bc2264a52cf3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e8bdda73bcf5e8aed6b14aeb589cfc
SHA101770f4364e58e4355a1059b470010683ebaab19
SHA25668cd8f7d34ce0a2f6adc1c472cd7bb65c0097b22c9c33302a23bf941957198b6
SHA512eceb724d4826e0672620d1b49724ff673c9f67d4428f5b9bce190f30e34f88c4c7d5100fe42c6189eb4baabf71649591b13c3d968ea35e2c771686568b3194fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde9900a5dbf8773094317d2adbf6997
SHA144d3e29f24243a076167c0eb93599ae16e49bf8d
SHA25632c077d049f567b99d34963172810e03fd2e45381b943b329bbb60957b03c4be
SHA51275b1f7c254df77b99c297f9331038d1a61243fcb281017aad7dca19d7ec4b007aa9a535d977dc7157a53d58849fabeeff0194912665daaae8266fcbc777cf78e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5899a265ace3b9d76b044fbca73ef3e9d
SHA1dadc99d40b80ba740bc7f4261b55fe6a247caed8
SHA2561066a918060ca9857662ae6d57037ce8f26b45156168d1abae9496ff745f9779
SHA5122cfb0dfa9d177e8a53e56284e74ca965f4340a223e63e6b53c69c6b56d8ac8465cf791362f38083878970768d9c4cbcabe2b154fce9c5e260ff59e023d6dec18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a21f012e4e0a05ce1534745f1a6063
SHA10cd646ee32364ab4d2c5ea04a1bb0d8883ad57d3
SHA256dff2de87f0f8f9b0d650d963d57314e2d44333ba265a1faa4e339705d9f13d32
SHA5124fddeba587685c2a1b8c2c9ac7c80221d19fe9520de50fd9664a3ef885e0e49d911730d20b2bf63cfb84b55017024a33c3276e3fe9deab9fb4a615972a1ff240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595cb2cc4d28652360dfcd0515f169651
SHA142b6dade43a539151d5b56c12d4802c4bd33e7c0
SHA25659cc0ac920af7222b0bb87d184461619dc26a6d0150c75b5b955470f87b40711
SHA512cef18d9f34d060415e2f46fc8e1a95994d29c5b95303f581caf50e4f299f413354f067684c4240c3f64fc8093d19c3b594fa5a5e75cf41ad0c99ff4ec4cc5e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8c3e771f7f8d13c45398d4f201c0784
SHA10ac5dbc2d91674f48d9a6c237307d296cfb6ffd3
SHA2563b1ac0159b49413c1ed3b2d839493f8c3ef51959a26ef62f52282ba083bdd4a4
SHA512207dca5a74a338a81f54793441bedb110bf3a4e3babf29391ba666dd0fe77f4c6665a719a587cd3beae6f12426b728903dd68a3b81d8a5eefb823d518229b5f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500c216ae8ee8217a84f631f3feb488e1
SHA1862df740a4879cb79129242cd1f834d581c43152
SHA256c166b64b433ac7b15358a854f515da629cbef9e8d4f276e09713b4627fdfee00
SHA51260217f96bf03b95cce33c1b1dd4a62f09bbc36d01ce872059adb0e5f55bbdd1bb3786719cd0b2379f96af970660982ab8b33c010f8fd0fcfd24134cb63570728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51f8e16ad59865b3da1649d1660d08087
SHA148bf02798a6cf89f8e690c99b5737c1cecbc8113
SHA2562ad9c0340241dc0112b58ed22a86ca94bd07ce64e557f39b027bb0b88c7b6795
SHA512c4f88757c06833c098bb7d26a8573cd1aeb14ff49056ea5636cbeec091d470b3a747d40e5a5d524716b5b3bdb02637cc16ae682cf6e7b35f7af5a46791bc7306
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b