Analysis
-
max time kernel
139s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
8718457b88376c5e6b6df35097da61da_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8718457b88376c5e6b6df35097da61da_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8718457b88376c5e6b6df35097da61da_JaffaCakes118.html
-
Size
53KB
-
MD5
8718457b88376c5e6b6df35097da61da
-
SHA1
9b565d08c7f16e0bc87abfb4ddb35e7bf984ad0a
-
SHA256
c87131ebecef937ffe6c571fa1f5f5209271efd60a0a3a2507cf58c83b4a0cd3
-
SHA512
8f1ef7b897925a76ed355fc067b9cb7a6d0d27a6443791d2d06b14f02860bfbdaa123f97af7e89d2b594f2e326d47c02999afbc12d8f85459185d26d0e357539
-
SSDEEP
1536:CkgUiIakTqGivi+PyUrrunlYX63Nj+q5VyvR0w2AzTICbbroQ/t9M/dNwIUEDmDK:CkgUiIakTqGivi+PyUrrunlYX63Nj+ql
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000068512bcc20a8eed62b76988b1a1d54678cd1cbfdd2eb29894e2ac1dff6219568000000000e8000000002000020000000a42c64679594d2cfa6c7ab7da583a75e3cff22100a4887634632933f083d068d2000000091fb6f54f2986eabcb06199df6b34df3f368c1230452e5e9f71d04a74a06e9f14000000021d8a3958aca99c232ac1ce40f97716139c96e2bbf0f79db2d1161d26c4af2431a406b16195cd459dde54c41b528a468bf32a7745b3014835cd1a836eb20a4cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429474958" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06E7AB31-5743-11EF-B3C2-F67F0CB12BFA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0570ce04febda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2072 2544 iexplore.exe 30 PID 2544 wrote to memory of 2072 2544 iexplore.exe 30 PID 2544 wrote to memory of 2072 2544 iexplore.exe 30 PID 2544 wrote to memory of 2072 2544 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8718457b88376c5e6b6df35097da61da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0ac45317b65814b919235776fb18bb
SHA1530b8eb8ffcd1734ae460b290af7e52ad268fcbd
SHA256afbf0face5ceabc3678ee6f75fe62d51d8b283eb5adf519975b18046e38099d8
SHA5125ae898aa31fbea02ffac47101efba34a31c76bba3e7580404346ae345ff4afed9b129cc4e897e31b0eaf1056a6658c796cf2bec6b37c689a2ad67a744910557a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b46dd5ab569bf2cf79afa7573eca4ae
SHA1034a8e8d55157cc9d0ce929d79bc74c1517fac5e
SHA2567803b0ae78864b0642008c57ed1c19c3cba12a4e3dbfd7349f55c34dcbbf0d98
SHA512e3ce72cb50f777fcc2afbc9d0a0eb90fdef91c96dc46263bf9455da0c20231948ace8c55b4aedb3a078e48812e62947ee11c81bee8982483d8b3eb54f80ff901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adf02eb273303aba59bac9c3d166760e
SHA1f801e9f5075df270d9caa0f1db52f5fc85d8b5b0
SHA25608c8547f3f9cda06fca727fa9e8b8a876678483fe7b0d1368da85914f30a3856
SHA512dcdccfacc0f76d8f27a46353303bb1b1cca8ba29961b58141732f4302fdee781164bb2bda766390cdce3f410ad36cea9ace3924d80e7c633f83fe65e381a0474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad38031eb338d83bd4eef93fcd6dbb0
SHA1112e5a1962c4abfd527e1f29a3118e19572436d9
SHA25619bcfe96c2f9e10d052ab973b84fa22051e36bd30755177faf6a7128bc25c225
SHA512b0f5cabf22352103bf10ca19777753825f8481d19cad84a0907ff62aabc906e4eda5db5e4c0c7f5b186cad5e72be46bc28316209e6c98d3eae4fe9d92d41b27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b24e71e499ac5cba9b919303d596765f
SHA13497aeb081842e6a3fa8e042ec2b94cf2599d59f
SHA256ab8a69276c86450109bf6721aaf74999826501aa82777667fb4d0611d35a3c87
SHA5129e384d36a8a4c0499f60f710e82b40544a66f6c7c09ab80cd3ef21d30b61398517377be7c22f7fe8cca83a70e182776225cb18cffb1289630986ab784b6741d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e13ba5891a15f694cea3c02ef1f65d07
SHA115c060099fd8d9714a4500fe37367d05c5e01aa0
SHA256dd3c9326b523f51cc8236d798d9a1d1b1bf0858bf86c9c01fb62acc32e4e2235
SHA512ef464ec615bd7c8abea90a00195e6f6f58a3c6aabf85eea9207574d7c912ca570aaad0892ee351d7e30a8654e72ca87173293f09265fe9525b4ed789f328254d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240aff0aa0e7f76b2967c04947d55fa3
SHA145866f3b1dfcc0a6d986aceb405d015a2c7cd13f
SHA25653f4c20b8ec5a72ff865e746bcb08b2220346ad8f3145cbe51605e21854db9e7
SHA51258d6b150a7bb0fc4770005292452344d003b82380d2c4afdab348195c14e9691e016c3f0babe2aec1cf6d97d58fda0139753d758e89d03d5cd47e19fc454fd3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59490e3ecc4b5046fc4180193d66a13a7
SHA1d8e8048a207f1282e5344ae77c1cba6d2a364030
SHA256d82818b90139b354ec56852bb7a081253d6e2f37b6c7ec673154c96f0ab59a9f
SHA512f7bc023feab8419b0249ff26e4c43bc18944787bc497718d32ace20ace65cbc35ec886010256a3634dea19ef6d2922375ec907a386cea00ed1653643607c59dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc26b613c3a50684a03691cbe76c6f65
SHA1b0bbdcc5615f143d3133852cc597694bbf489e94
SHA25653e733d73cbe05b587f83561fe5da3c00d45284bae74ca623279367ffd809970
SHA512ef8a54cc2dcf260cc8e3e4ed4269b7cfac19d0cd9475eba1702fd50826cdd66f258e968e0f959974e25345b63f52d9ba6a0042071210b64b5f548ddaf380cd6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471a14de4f6539c3a60175f6cf45bf0c
SHA1cba8e78949b2da02a0579386e925377b83e23103
SHA256f80c09a9e1846dade6bc89c7711607a2c1800370ead99904f5e79431f5d12ec6
SHA512a4d9429619f07c558dc8be5be17dbdb5d45c5b89be12bfc79e8db2ec8cf956bc1a569d6f91c1c2fcd64735ce9f849823eda7eb0c6d47d02504e4c9a9afe15c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d477645caa9120016e62d8c4538b26
SHA166997cf198db05d2837bbe2f9e534953afc9e29a
SHA25664dc0ee841d8a1026166eb1dcf2c083d7b322a468f099a4d46d0c7332671c4c3
SHA51213761fd023e4252c2731e1029536b06f5dee1354be79ce9695f8075d59e160880c20a05cd29d8e157182b2bdaf607f774a838fb3f20c0ee632b88492aeef4838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f17280093583c448927fd06a750856
SHA16f331749e814fdf4c86688b89ed23a5e47dcbf94
SHA2562bbae8bd50ff1fe90b1017be7527e9ef97faeb1fb2cba05cb68bf1e29fbb4225
SHA512250df5f3611c30a498d19b2958e31d16b80d7b794f219ee971dd1de3178a16c2eaa43bc34d7487b15e135eee398b58df78d994c02b377b8aef07642df1cfb78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ad00a98f1ad9e5c7828e76e7787de69
SHA16245e1444d5491debd325756f6f23caae5ec4d80
SHA256f4f3a3033ac9a61942c4120da82bb3ce5153bcb56ded10d2af03653a6e464a6a
SHA512d9947b90e3bb4f9f775fb3408cc1395d9575876e68ec0a0473fcacd85bfa5b82203eb21c1d49bedea2d65820afa97aa9149bbfee3db7066200e9adc594ec73ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50599934992c7b58501cc35f61bcf895c
SHA1c57fd94eb3bbcdf7f743434ccb3a550e82b056ff
SHA2560456e10fbd0a33cef3d127c75694fc61990937eab1870e7da1e8627cb43919fa
SHA512ce46ea66c36e93d5427751e3c3e0e40b49056a35fa6160ed33e46f61bc9426c7c7a53e45318986377668cc53fc5e91d4a97fd4ab980c9ee6ecebe57de775afa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aafa20126796a23c42ade93906f6d34e
SHA1591743eff788cca4dc7cdb4a0ff0bd8feedcf7a4
SHA256675e494e80e8b607660bbf3daeca1719f92eb4492b1b7e49d33b32ac50fad427
SHA512b25a3438ec51d40393a988b68e58018e5a922991be8c1cb95b6fc9057e21cbd07f7eb42ff60f86f234cc557848d9e5cf23b9adde50682df6c8b04c1dd6e31436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0db892a12370fa7acd106aa0dbe003e
SHA1953f6f42c3a988ff1a212b17dff727ca881aa1d0
SHA2562f2e50ce3b8625127141050f1987cced099f27481acf2316c2c21088910c8975
SHA5120fe428f0d0da339f02ceb1ab1500a548a9b76141e4f869f3816a2495b2304d1cc02ebd03d5b014fe262274541e97253174a773dd885649fdaaa6f37638f852e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff0ec0023d05634cb4ed38c80835fc7
SHA1208ac67c6325d3ffc26e1d8322bebf79b5a3c038
SHA25672fc6b49fcb3ca16a81f7009eac892c1cb2467be2828da9f6e07b2964bbf98c3
SHA512c1d20d13e9a133061c69c2d33b78e961fb6ec48d2acae6b9bbcbf59f3f6fd78211b76353a39f88437a81edcf7453fd74875607cfdb77549f3b48db46d9aa6f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b0a38c955bf7e360e194392183b04e3
SHA16638e82538b8a32757030ac08eed9f731944c33d
SHA256c675ddec632565c5ed9b8d1407d2c2626b687376ee5e9affaedca65466ec58f2
SHA512cbf45fdab1a70aa4220660aa907815e01a40ddfba95f090e0fe382d4d66c58024803d6d48a69e8f1b4025ea3c3564149d98f87639cbe969abf67770545c80f70
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b