Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
8c55bccb3a692e3aeb6270ce1650436f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8c55bccb3a692e3aeb6270ce1650436f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8c55bccb3a692e3aeb6270ce1650436f_JaffaCakes118.html
-
Size
53KB
-
MD5
8c55bccb3a692e3aeb6270ce1650436f
-
SHA1
84c6f97dcc6205233d2903720066bac7e3a3ccc7
-
SHA256
468f847802ea63337d83cfe7fc651dee703e9bd8df01304acc6ef217f975e4ee
-
SHA512
bdb55f2792edef5a6cd20a69145caabc7cfbd70faaff8eb9adc8d3a48fc115e14d39606ce5a3df33cec124133f1386a02bfd47c4390f6436ddee48f1d4fd6cae
-
SSDEEP
1536:CkgUiIakTqGivi+PyUqrunlYV63Nj+q5VyvR0w2AzTICbbso+/t9M/dNwIUEDmDy:CkgUiIakTqGivi+PyUqrunlYV63Nj+qK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000002e540c54a6b5c900062a87b9b000a5f195a58df713f05b79822d8bb9edf747b0000000000e8000000002000020000000569d06ec833c4be7b20c947207682bb60acbb93584f7cd2d48f360f68f3bf74620000000a74183b10442612fb54aa06a83a3510d96ae38df038b0a6daf5400710621922a40000000a40e567002a0ab7631fe9fd91b4c54d9ea92d77bc29a1fc3b8b6ff042c62de5125031d7c2a55957cf004a152774eebe05161ad9bec241c3f804c2909134ce161 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E2CC8561-5835-11EF-8B6F-725FF0DF1EEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429579261" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6081e6c742ecda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2756 2708 iexplore.exe 31 PID 2708 wrote to memory of 2756 2708 iexplore.exe 31 PID 2708 wrote to memory of 2756 2708 iexplore.exe 31 PID 2708 wrote to memory of 2756 2708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c55bccb3a692e3aeb6270ce1650436f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99fdb9d74f8d5c4ebf41201f617024c
SHA17e4410bb2a1e0bbcfc60cb3ea8b3517be4251d0b
SHA256906784dd39f70785c16209d1f6fbf5f2a7b1a1f3eb05bec2e0aab19cadca9a55
SHA512e0c44a6bc19668916cbc2e93cfe6bbcba2a286a0985ea6d8842822d710ea592a8ab2d96f827a1fa094c8d25e74285e3c56574684c2c52ae96eef83d305e56e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252a2c70a0d006cadd6ab1902869a4fc
SHA11619f519e206e861b47e28db366d68020a98b2c9
SHA2565fbfdd93eb7ee9b72bb65424ab4b9b1a04635c170a13a826d27ae9fa8ae2df16
SHA512df2cd734c971d7dafd9319d955b5add44fe9985f3070a88fa00f432a9cadc203b175998a3318422aff32582dd0c92fc68804ac347e2270aff8ceae55e8a75c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f633ce0e898e9d3d381fdec67a2390a
SHA1e53b9c813a0f570e6f66cb9f9a71559be0e4c21c
SHA256116b2cbf6acbe0eec0db242cb63a0eca7e80e70f6c56a5ef7f284a3f5e47a5d1
SHA51218d2efd9ad4918769e754b4180b66929e6bd5d4111312a13465d211ed04cb1ff514a8107c9ddc4d8bfede0d3c3fe9c0502b8d0bdae4955300b6a5aab5e0920b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446fda852b12f83ea29780a8e4981b94
SHA1e7c4134afa810aef238c572ce3e5214cfb5c5db6
SHA2564210977a768ec66a842ca8834f999fcf2a08e66a429d331dac8edce8f3363e4a
SHA512471963a10734dafc0f3568e2dde8e27996724b8f5bae0a5837cf73957d804023f7c25061bc8ce4552f812a22e06aabad1a90c60e723c5c0036dc42afb30a3294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf373b3791589d05ca38d7faefc3bc7
SHA17c64557690b10374981a1ac60558883f2f65b261
SHA256d94f9873a2f4da4aeda170a4c7ed0ba1627e0db33af58a288ae6b11823b6df20
SHA512a9900b79b94123b499bb87a52d890db24f209b749751bbc03c070921b39114feba35018cbfd7dcee0d73df2f140ee68a5ba5ecdc51d302a06da44233fc6bcae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77dea9f6b796af95e08607b12919491
SHA1a023aae809b892f8559e6e6961d7a943ba6e4f18
SHA2562b85c03cebad7256f92d9da703f48a73db2373ad5eed74c48ea01ad493dab15c
SHA5128f3ec7dc89eb85f5d348b51311b552ceaf4664540695765006229a3d0bfc9e1bbfc8afeb8ae52c2663a43819af4e20f69307e53dffc1a91c45824c066f06dab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e6ecbaa970ae3d796d2ee8f78e0485
SHA15782722554235d9b288c3731f13f3a6b8a9ddbe0
SHA25669eba2713a75ba5a748a246cb393a5d0bbfbaf312d661950194d0e4cbe50bb93
SHA512f28a4d6df617c8eac1a10e46ee4cba9cd8dda20be629899f6d4c341c6d021aaa0a2c8ce07779022852376cb155d9053a6693bb94e6f128f333c1e0ab6ec07ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4c70e62aded7b1139a34480e72dda7
SHA1385f83e19e7e2897e9fbb6946d9271b1872eeef2
SHA256e642a06f10e4ea561789ab498379efdafc5827783afc6895029bff84defe983a
SHA512f70c84e22050e836be0fe0c6bae98956dd930da09e3a11eb8e7d60f501c6f25a6b910fb268b026e8b76987a4207b568270cf973470265e95949c92c65cb22dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cfc85696a7938d1648a97ec49f4d7b3
SHA18d41f4944f0d44f2c94ba8c8a1b534f2539d6a44
SHA256ccecddb3030b9cea7ee7a85e70ad37bd55bf6194452aae338087a5ec3a5384f5
SHA51251490534eda6660888553bf57eef4a75b26e2aebe0edc225807ae0400401d6e7dc51b16e884da17b2ddf39cde124ac188104189e63c7358f8d37fcdc5565d677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cce412a1596e55c0c78579841349aba9
SHA15e85add342b505ff70567e6c35ff4452c970232f
SHA256a6e76fd220106a7ced46e865751588486064fbb7cb58fd0c6377f158b8371a9a
SHA51220d734ac2020c7c25ee6363b7ad2dcfdef89f82dc450d5139405a36551a8f60391bd07673497f9335465772a0083787964048cd9d77ddf1fee70dad92ed7324f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5791f3b70a9796490ebe0dad38422889c
SHA158731893067b071e87d0f9c26eea615549d4cc53
SHA25624b92a8cace2e3d1fa845b41498c0f05df0880215671471ddb19b322f28b4c9a
SHA5120144f31c3c1d382c63456ecb592247480a2f1c2ef849a31013875c7b741e6798cf00e73e73b57d85dd780d545a9595768af7c00f2d0b770b4df71b5fb27d5032
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b