Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
87907f1a9e5be3416fa98d14a7c5a13d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
87907f1a9e5be3416fa98d14a7c5a13d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
87907f1a9e5be3416fa98d14a7c5a13d_JaffaCakes118.html
-
Size
6KB
-
MD5
87907f1a9e5be3416fa98d14a7c5a13d
-
SHA1
dea2635e4577c2a101fc34fd7b9467e75f3f940e
-
SHA256
d5ed0b2c9b2748791cce225f015d5e667fdf9d6f4619d1b6278488e0c4254a35
-
SHA512
1588b28f08e756ebd017451ffce102ebc3dbfa87ca25ce0c6da456c49cd987161fad7923003d1bcc9d81b52ae550a45882fe079f7be758ae76d7c6b56626b368
-
SSDEEP
96:uzVs+ux7aQtLLY1k9o84d12ef7CSTUAtMoRS0ocEZ7ru7f:csz7aQtAYS/vMoCb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C7563B1-5757-11EF-A248-D2C9064578DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429483740" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d7f35264ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000fcc24a7aac80decb5d1b6154067fcd42ff1c237f34cab383f9b2a46e7d9aa9f6000000000e8000000002000020000000921eda735978a396b12adda31f78631483303a9a1f206590e067004ce5c38a482000000016fb6ce4370c0a075eb191369a4ca6ecc0303b9d44e7dfb7621b33ee3e73cd1e40000000d6f7d39cc9fb9092d1f45359d2cb7007f68d260a7d8e8d27aa36159baf952fbb9e6aec82c1f43978022f96970b501bee59aac684baf8fce57a6a190a11449fb2 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1748 iexplore.exe 1748 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2192 1748 iexplore.exe 31 PID 1748 wrote to memory of 2192 1748 iexplore.exe 31 PID 1748 wrote to memory of 2192 1748 iexplore.exe 31 PID 1748 wrote to memory of 2192 1748 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\87907f1a9e5be3416fa98d14a7c5a13d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9a14487635b0c31a6117910efc099f
SHA185b54cdacba4a4b55e1a1e6d7825ac1452500246
SHA256cb2c72d9404fe6871b8e8a547f98f9e79167e659df4ce1ceda9f674b83fdb294
SHA51231c9ce5f1f18e66dbd4b02d7f93cbbda3bec012539923ff65dad1cfecfd40540a49a05898024ecf5c6a1a215c69378a1a6580f1c7e6cd4515ff4845ecf3ad47a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e3ca50a17e6d73604b6dd347a25103
SHA102f8f0b7229ff463be86d4e5f4dfbf7df873dee0
SHA256dbcaa854d86c221e1794074619f5490f61cdd9bc4df9d1c7901f647b16955ba3
SHA5121e325cd23530e1539ced31756fed381ca592e21080c37cd40bccbe5cb9d5182a9bb42e79a863b412dca5b92d175d72047c9a25ff895b23f61dffaeec53d9de26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86972c9f6152686d76bf0e1f272e7f3
SHA13961468da09845c3ebe419037819b9b88f0f3ddd
SHA256c31884fce5e636849367683a692c02a39fad3489a303bd610c27c2fd8347e876
SHA512df56a9e03d50c966029bee37b7d410374e1b18c688748c60bc9a41a75d059108be7e2d5a29a180bb50ebb2e21444385ef9e793ad06182f8e59c22e029dea0d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5577f45d9609df463de821e61ba81904f
SHA1916730935eaa6d21b11539e4bbff055fe3c228c1
SHA2565ebb0aa385ad4115ff4901f43917f645d97d02f068b16956f913558d8495205a
SHA51250a91115c6279b2aaee51d2ec8004fc4a0ca43efdc349230374854add1f9e95c88e18a63c55e3334e26add5159268151e1a0f58a5bc2d3fda44c32090419ee2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3a5061b3d9378178eb12591b45d351
SHA1a4af8f48f23bab9a94867d2deaf4efeb621b896f
SHA256ff819fd794a5a293bc61b4f76e518f7bf0e6fbaf5f86089ffec2dc21d2537c71
SHA512993d9a2b5b327a334fa769e0c3dc18d78a5c0de81b1c94961fa9d120778cf59ebc6475780077189b1292a6423238b98a793359feccff43460a96e4364a3c90e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705e41b5996d5a803561dea1ea2b8cff
SHA1a866e91e2878fb104b34219640d432359682e004
SHA256321e30d671f17b009b75d267951f23416062f2982bcfb3df2274884d56a2a480
SHA512294ded234a0d29fa66a7fc948a5e8a68eceacd46c8c51efa8bc228b3f9672099e4d2f0b17c9fb8c0b1c9043053f78ac36c587bf1ba32625c099b31ca1571e5d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55524c539188e5c751440cc75f61f417c
SHA1a9967a41f7669e149090ef40957055194c34d1d1
SHA256a14c7856dd0443c696607e81b35536a8355433d29711c7d42dda7b0ae2f5301d
SHA512905b9bc231cf8f1c693a662206076130069204a8f760f3ce75a91daa8a966047b80ee2aabdb00507a8d1c321a8fda9510113df069d7d64ffb7572b663035da17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509578cc5b6e489dac7a67ffe059f72ac
SHA1ee2784589bd1642adb67455c28c763ed3cde8575
SHA25691b6956d649f5b1bd0d843be0a2028b6391ccc7b36693417e2515e5acb83ebfd
SHA5126433bea3652965daa3ccc41cd0ab7f610653c0e2055880a4053bf8c888328b29a0d39e183d2ea8aed5f157f2e313490d8942e3aa6735559c031c59f887e9f1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f18dbf3d1f2142ba3ff3cbbacf980a
SHA12378a8b80e6ecdaed7ad96ead67a8de85a8c1314
SHA256d76978cf65c5788c1f07afdf689e5ba0c12a91536043da58742fe3d50f650dbc
SHA512501a5cbc766b70164891b3793203f6472fab76485e8105d5472abf8fb1bbd926822e2d350ecfe72b700be885e7cd7a6c01376cdf183fdc8d372adf2df1e7fc8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130d996c36cd46de05545d2d690661f7
SHA160b395c739fe3421b45c690ed686b1d7c59bee5e
SHA25650ac2cf926b229bf6177f96d0462c97957269bd4ed34247a58e23a39a2ec343f
SHA512f041bcab0b89bb08af156d157a91eb54927531efea61b6a1a1f1d2f2bdfe1a62a3d72df64195e90155cd8c912b74f15205d817efa423284151de0eb3520c0c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5583db91bf6b6e33fa4d4f13dba53a811
SHA10507f1cd343fa6582b9089a623d3f77e0a757128
SHA256dd8522e7b541c1fcaab137e4bd20ae1465c6bf6965989dfa03b7ded540c6eb5a
SHA512674492614517c356b33b8cff2b9150a42a8332e3f3571d6b9c81c46519de7ea9aabd259c07f46da6859c849dafd238eebca137945498aaa03f7daa36a7777e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9757d6d09f97949d27159bf819b72c8
SHA1cb039a058080861a7fc5384cc087b64e35529aaa
SHA256ec5305873f0869a573f235e8ccdf887564ca733a42343be61ef4710cf829e2c3
SHA51225fa693e3c9fc0eb577b7ba1a3caa3f7c387bea7b9cba73c9bd55e6ff61246851ffcf7fd631cb341135cb33fca31e419f56985cddff214afc0c3c0b1308b02e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5612633ede5ba33ee5868c0fb845760a2
SHA1d9255b4eb710191243df098cd012df2c29753885
SHA2561de6d67d55a8ec98a6ec20a5e54cd9cab3f3bda2feaf5e6520102f7412dbc6ab
SHA5126fbceb7ebb177e92193cdf7f436e6fa53d3effe11bcaf6433feee4a08ee5c81e22692cd019893fb71dfbd578e7c364bd65c7e6429da8869318f65fff960b3abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f416cf25396908dc76ac26ce4e2536cb
SHA17287176d9c5be4b5cd38e5873f4d0f2ffeeb7dde
SHA2564f3b75e5398965a55b88d5eb6b766b1e6aec40690a671e8eb7dcfc59738a0928
SHA512ccb4fea011e2bba815ff153996851e1cd3db9ae82f4dafddb906e8d98d49b729a14ada7fe0d58a331962ad802a51891554c443a6816d85769a4f15171f87c690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253b1ad1dd69fa76908f91cb3238f7c2
SHA1616e00749536263a228fa560c90faea66225f18b
SHA256724ebf3c8391fc7cb13550f16e7d89ca63d248ae6e842f1025790d51974ac7b4
SHA5124e8a25e683b9c91d9533ef53506e0b10d9ca223c90715ff7726543aea0fccd264b4c7296562fd0b31f2fa683af682be1b25e01722aba8234312474d32e2df05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537d10ce11115f0387f8bc5f5d0cccb4f
SHA19963081c48bfa66c3e50aa7c48c453e8a72735f6
SHA256d0e890bf9fcd12ffe05d1efff7143658e971f7df0e6e4aaba044c3adb1068ef7
SHA5121a410a155930790a0028511ecd03868de33cf49c4c0733fa80809704c880297998b17e924ce03c5207931b34f80eff952e1192a67633c67fabfae86783157f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb038247830663a5ac0e294785e75391
SHA12af107f484efd24fb53160b3ee34b430dea20e30
SHA256d026254354aebbd46ed8b26bcd5231107b451e0c604d06fd2d11003aee73b871
SHA5124876335ff38afb236d02d15e7716fa67946fd38e579a790ae511e2e0016464f2c7f9b6f63fa5853277a2ee1dd96bf505904d73ad59f6be50e4da0744b1071e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fe0a1f2cfc20c9c6d0f00521b011051
SHA148e2d64bde9e6ce9d0cd5f712e477086b1b42217
SHA256e22142f3fff69b2c298f8f9a6588041c982a747aec57d3c8a860ba811ffcf302
SHA512fafedf6ab339a170f6f6a5c845164d22354d5d1d429a4fb4e60f0d10dc90ea04579ae46ecc8589840b71ea861382b23c9128b26ae28dc0f2b97310da1d37ca64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa393729872d30cd6000b0b52921825
SHA1e52f564c146aad26589f18650f4179e879d30d5e
SHA25687eb8257adffbeb6a84d7f0a45e0ffd2bb5ac8be4ac199b379fd71523e284101
SHA5125ae7a09148b2bf8032701c523aa469810275683b7556356e427d3dd7641cc4afa930ba47e733dc320d78a66693ba6119db4d37e66fc3ebacaf45013e5ab54be2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b