Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
8740b5018967b036a611284d134b1c56_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8740b5018967b036a611284d134b1c56_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8740b5018967b036a611284d134b1c56_JaffaCakes118.html
-
Size
11KB
-
MD5
8740b5018967b036a611284d134b1c56
-
SHA1
31bbefb7c2db08c0f842fb5fc62aa1fded3b8954
-
SHA256
92f88f350d23db5c59a220eb0be64819cf604ee7fe2fb35c9f794ecbfe0ca9ad
-
SHA512
ee8956547fe4a3deba80bc5e705e0a79f0b68d8c6c7cdaa99b5e534351f338d53d6199e87f0b369a69ace9778bb67fd25ffe530fc688f12836f7753a569d63d9
-
SSDEEP
192:2Vr+lIsr03rY8k/w1wvqLkZ4B0fnSv4+lS01OmvLuBuLbdU8d:silIcurY/gu4B0fnSv4+lS0OmzguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0cce1a356ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429477801" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A880F721-5749-11EF-B8C9-666B6675A85F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000002ce17504d9369f345ebd488c9baec1a7fd98ed537e3cc54d445d0d94560f4a3f000000000e8000000002000020000000085bd9f7556e01ebd662dd43250458c0117f9a6a1c9b9baacbf8f5f11f5c49b4200000005260fb2da304b780b69a6c174d0730ad3321bc1e3fa3875f5808d80ee916e2cd400000002f0b36f844e80f8a10f880604bae0f4822ffef578edf01f59faf03505933e7e75f1e8e2f42d82c6fbe2e4a229df984307dad59cee2af2fb0c5f94e63c0d33c6e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 3060 2356 iexplore.exe 30 PID 2356 wrote to memory of 3060 2356 iexplore.exe 30 PID 2356 wrote to memory of 3060 2356 iexplore.exe 30 PID 2356 wrote to memory of 3060 2356 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8740b5018967b036a611284d134b1c56_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b63bad225b98102e9776d8e40b9929f
SHA130c64ac2fff9a718a9afc2dee01940cc288f69a0
SHA256e648d3573ed3bd714acc2826be4b16d37fd845ded4b5c206acbe73250088c5b2
SHA512c6c5f3af663eca5aafd1eeeec1f3b6bfd164e78d783cdda431b06111718f9497e9005dece7de1bba3e9e742537b7d4e87ccd731558ec9d94a150240a9ca31ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ba757b312f2830149e2105eb8ba70e
SHA18710d6878ed62ef3a7dd7ef02a26c66c1eb5985a
SHA256267bf1b33705a442a165eda79c0eca21e16d7ca46526a624938459f29ea1f4bf
SHA512d3bb58e0c72d083e0b6bed5e3a6f9db4ed5f55b0432432a3f6069676555d6154fcb56533451eff1fa9437fd661fc1440d7106a2b5025f1ca0e6dfeb080ee00be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974be25ae85e03530dec02ff64011dda
SHA113bae8256da50e3222547f498998d5ed7a4303f3
SHA2569bc5376d918c3859326d3156a1e91c6462f7c20d5d0dd70596506299e3dafc7d
SHA512842a31c96d9a41897e541d0ecd0b06b119ca84cd01231788883b7c852df97bb6d1463c56070d67c81fb078bb32e7b40031f14707cd2e712af30aabe0a4058b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf5c45656829bc13c1d9fbbe8e9480d
SHA1c12594be73ee53d27d443b0b81e8c5771219717f
SHA2561b771ae81a95b36773d272876d86715accc12c44290fd3c737aaaddc0897e43d
SHA51243f10f5176023f4bc47af2de934725899cacfe29fb6a2ffc26409520cc9a9dc1607c8c0d39377ba1e6855da82d7fc7e9f9ae1996fc1afdc416dce07666c04ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e068fe334762727fe7ceb26166b6d31a
SHA17b28e46f73e27d202a5f2d6c683a37647918d784
SHA256569f8b70e3a50148c27883d9ee0f02f3dba8dfd48c7c9bda6045133e95e0b34a
SHA5122a77a8b7773f7ee4f8f3bf6a611159dbd0ad140b209ad1393e80e4ef816fbb0fd15a6aa7b6d87a4edfb34921af1fafa3073284a5e0a63bec17707b0ee2ef8749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996ec9abe588da41575725d11fd68deb
SHA1c1b4ec08a1d24eba1047b91ea7ecbcedad271246
SHA256b165b41f58e9cc19a195868dd87e455a2fece2d3de7cbc08f50ac231602fca5d
SHA5122432cc78c602fcb6f684dcc64eed06304d635bc20a4ddce9759adf97545c228954bdf479aee99878bf0c6aed397ef9b3c635fa41afb3ee632dfa68b7d42aab09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550cb8ac2a3055108591546c3ee85b2ed
SHA11319f40fa6e269832936ea41d58171b0783160f9
SHA25635020d121b4617184db9972d8b46d88402b05ec17337ea02e1dd52ecfea83338
SHA512464dae9bc39517bb43ff2ff304f8df7b9f114c5815429f0b8d5e5e17fd1f541acaee0923abc8653d8244c8a797d5cc8e687a182f743d3a8eab96baaca5a76332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5084ed0b53283474f6c8a07b8971fb8a2
SHA13890364ef02c7a0c529e00e942089f9743d2f27c
SHA256b9e2e3b498b3bb462b399ff4a380f00f63dbdb0c6b4b163cd10a2489ea178c30
SHA5125b9e814815e7935560af5b061d677eb2e8c68bf86cd5b6128c3ef2531ca9cd8e6b23114b0105ef41a7621829677b30a7c43b2d0255c8ca260d5bfdd0dfff8c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb694a6934845315e5fab51684a97f8
SHA1815668f24315a84c6c868f05d9fce746ee139e5e
SHA2562e296dfe393813232569e682d0ce5bf10ad6e622b28c7a7f3eb9e9b7e1bff360
SHA5122fb594bf87ecc17629c596bac514b0107502330f6ae2de4eab89cbe8b73abaaeb228737b36895f83e8677704c312dcf2229923b5a2c4b0db898349e1b9a74f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58963a93bd3bd720a7e2de3b829754f8c
SHA11435e67d52cd44f5aca81dde96fb54553fc05f04
SHA256ec625879b5ad02199f32011e231229d91ea1ae65b190cea2350d2379b20ba7a6
SHA512bb0b3bef6c1edd4f5f7b744af161d3013412f897d89ba50ac1f03fe02bb626511b862ad85aa7fafbe318bfec3daf4885a2ab46bec68a8633258cdab8344bf8e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a47287031292644ecdadedd68e98d1
SHA1c91f092bc2969e9927a9e007f8d643f1ee886248
SHA2561da9b00ee568329e0cd8e6fb875439531d12f682bdba2c72b5eca4f41c11e3cf
SHA5126d0184681b43753cf26085fc18e55679ddd7b8df41a5cd126555adf0d570b98a9772c750eddb15ebc14514684a5cbb8a14d25569dbad333c8aacedb9eb4e51f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec64642be43f2c01b0a3390c1d5345c2
SHA1f99e754bfc25f5a2f92842d24bd70c668f74a7ca
SHA256e8dd519d189dd4efdb45d882d9285221c7db1723de6fe28da3f2a1889ab569cd
SHA5121bfc7142a67f077e62009a8967c30ed59d2383dfef038da2715e1c595a9a399e909ddc733f5ce2028909c56e22d50e02dc4ce820514135bdf7b852c3c2d9e43c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584a4b5adcd6fb39c48ae16433e766384
SHA126c19dc4abf5cddcb66aecfdc27ea8861e187eef
SHA256967a538215199ffbc6151c44e39c71a6474ef4cc5d2ac06728d93870de9d5905
SHA512a15191fcfb93c80143dd9dccac39398f9599d7d7c92054731d1f6c27bbe5ef684e05172b061ab9456de1d5413b4377f05b4075176050e18c65a4207aeaa7c1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57393844ecc2909215d0ec133fac39d2e
SHA172192268c204fe9b5e773d64c5b91bc1ba994123
SHA256bef9b737c123b1d937d5c75f41505434fc2d36297481a315c5da37f7f3dfd277
SHA512c707321c7fcd2c1340c82791795134d2c2966e8dca5cc4faf1f5677aaefaecb533c047fae283d7319fbb1eab87f85762708f6b3b7226170b3a0a64fc6a0d63d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552464202b61d78e04384e5c6d30d4016
SHA1f67453be4776524d0749ba3b17c5919b125bf4cd
SHA2565aebaeab6921f6ba9d69285aee18a3b9a2e0a92ba1b395a1750a3e6171a5bd12
SHA512f4e57be12369af149fb47defb77f5d227f6a595838ba55c2f760bc392474fc0cc42a4a418ef8ca30c81ce1aa57153018363b9a5eebbf6f7b97d5f9a349978e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5231d8d4fa026537148edafc1cd54c903
SHA13122fd6d4103f53e1052582a3790d48ce1ccee48
SHA256c9f92bfc328b704e2e32c9cac1f99de87a2a2b3cdbf41a9d164ed6459f6a81a5
SHA512ab2bcff0bebd74b5c9be79d0a0a21a62bc10cbbfb10e7322a96452639a13fa42e3a317986e9a059aa4cc1c522d52c597d7f69fdd7e3c6286c19e59d7fd2f9ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d274219003527680b050a8c7dc9c8a
SHA12632ac90d6e57d743440b23d8c440ceb9e8738aa
SHA2564b040cb997af6c06eb8d6e746fa099797eda6291fe5bd2c13ab8c294722e4fd1
SHA51261ff16c1ebbddb310a9629b0e4a08df8c43c7ccc78520f4de8d2855bf827bbe59b4dfc52c408ba0224a4c6bbc63f8242a6072f0fa6b4cd493c03de44f8afa1f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1aab00f12003afb30892c83e32eb5a9
SHA175f0719a5a378ab01d5ef30cbcc8201aa0f840ff
SHA2561e16aef54046fce4c5fe7aba2b3b5376ba86a6f4a7be8853d542400afcac3894
SHA51208d381ae58badb9a08e1ad3d7511107fc2116843171b9e0fd9615cc6ec56c5cc83848e9b9eaac8d228e029c9a5210adb725687605c9d43958ed6a457b7fe5f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c7d5e5f1c8817adf28901e6924793b
SHA186eb248b0da60ef710b249dfa1469e314daf5e6d
SHA2567938d188c1fa7c90e110b010092c0efa7e892627e8205fc18a0019c18b4126df
SHA5123b096fb270871db79ea1ba3a2f524e098faac55e7b294aa670a49e3afe55c71b3fb73970ec7ea574550877d457fa14ecb6acc5617e021692ab9d40ca1d123a5a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b