Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 23:06
Static task
static1
Behavioral task
behavioral1
Sample
8c57c52a792751c79b17768866a4880c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c57c52a792751c79b17768866a4880c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8c57c52a792751c79b17768866a4880c_JaffaCakes118.html
-
Size
6KB
-
MD5
8c57c52a792751c79b17768866a4880c
-
SHA1
4644ce7a4d97d954e1da1966b2e3853a63093be0
-
SHA256
16180643582485e63df2514ffd3d066a6709d6bac6f7cf60bfbf97c2fa5ec482
-
SHA512
e23d31c5c9f7a74e70e6ce8efb98ec7d38fb79f1a11abace74f78d92d8610c9c9985fe704b01bcda9ee7ed6832177b78c0923eb509e49327c30b6bfa40a438c8
-
SSDEEP
96:uzVs+ux7m/LLY1k9o84d12ef7CSTU4sY/6/NcEZ7ru7f:csz7m/AYS/F4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54998441-5836-11EF-AB8C-CE9644F3BBBD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807fa64343ecda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000265fa670d9588235b0b9c8602f0a80722e321af942959894386967d290d219bf000000000e8000000002000020000000413f2d305a660d769cccdc7dbfa2179e9f1b517f6f20d9739b455f34d2bdfcc32000000018d3d6543b5966405822074bf6af85851eeeccfcfec567495e8d4f986f0776c2400000006ac7dc295ee985f7787cd9a19dd0c2e633695b87c0c48bb121a9eccfa33f546f0f73be8a3fe9aea1ed7eb6e94cba2b2d02c5365430b677719ad1bf65d9fb4ff1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429579475" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1616 2088 iexplore.exe 30 PID 2088 wrote to memory of 1616 2088 iexplore.exe 30 PID 2088 wrote to memory of 1616 2088 iexplore.exe 30 PID 2088 wrote to memory of 1616 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c57c52a792751c79b17768866a4880c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c3e9a244655ca8d00257b624e31388
SHA19d7f7dc90c79d5974f69776b708e56255766d9ad
SHA256e2f0c75f4802c512a5c6e30e50fabced89833bff27774bd9f898fcc3abaae7ac
SHA512ca85af181a325118353441a823efb149c438375b8c573d021916bb45f20b1d9f41341a18dd07ebc44c410cfb1f55dcf1980af5ef0f8ebefdc363449e49b90297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51999492a721f4007d9ba1c5c590c5fae
SHA13cda4f16f81cede24889c174df5e168d4a4f9f8b
SHA2560e46fdcd1f3990629f34c6197358b6e6071750a51a00b2b32048f296d5e3fe31
SHA512280eb85cc6ba4e3b4ba783d61074ab8e79e21036699c4d00485ca15a62e53123392caab363a13b7a4f23f73ade34dbfe0a7ed186a05aac5c47da64d0db5db4c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573fc4c5190c2e03bf975c022d22c174b
SHA194bd1c698b7c4240127eef82dcf87f9465b997f3
SHA2565a4de11c5581268f9f1450569983b5f3c8b159beb4326057953336c0b476e5ff
SHA5125b5e63c4f5e5a51eff48d2a481bf6fef0ab0a7ba56a555ca427e6d0fae828e41e5bfc96e24a4aa2a10ec4e43042a6b15ef618466d1946da22868b1ea9cbacb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570c69bc2f52f94bb3a9d74b81d6757af
SHA121ff21690f44ae2d68348b334e15aca69b7e42eb
SHA2567aad16adfd48028667422a1df05a5739459788400d83b3e2743f482705c7c897
SHA5122b3110f4d76c6f14f820c2e07d2a5741e5c12a6cbd99e63bdd0eef81a7eda9c9e380efdd4d3dc83162aba582965588b933746e1860759f974a195af8f1b3bde5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579a0d998a2720a0bf486432ad3dfd21c
SHA1737d8ef6a9082ca55e16a16dbfaefe9fbe320e03
SHA2569b61fe9abca062bd5097f67d32761b3cd504320c8820457afd9a2738a70f6b8e
SHA51255702d2db843ac37eab051cc1d5da6b148a331a6b44cca629bc7fe10ae736562067feb7e6e37ed86ebb313cd13e2e8038df4231fa9c43a643b2b4b3b25da57b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5249f2247f065c3994dded2960d0cff6b
SHA14b56f97897ee44014bfe414d4e9fce752410063a
SHA256effba600274df6a5134edadf5674c5340916ee4ae99a0fd216fbe1d49a92dc2e
SHA512f069981f6882e45966eea9f0bc6f5ec5246e35fb239f536cda057f70085fc1626301e1a74970ad4f2dc81f58e0be851a60cd730de463f3c6213eaf25c67cf075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f46d6cb5cfdf1017f901890748eb848a
SHA1197da456f5eb837d7b451c826bd93558a25493f7
SHA25695f6f623f11a8c43901b7a9f26c86496df41304c0ca12bf86a851a56168255db
SHA5126fbd92a3312e7eba2e6eb1629c419584beef6f05db1819b4a005755a5ebfad486c05d7a8184f1063213f8f52c78ab6d4adaef1fb1132163b05adc37fe3c1a2c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506bf83aff9946d99c1a9aeebad10d077
SHA16d6f278b52d4bd4dbee7aef7c91e452d75274cd0
SHA256d73416f95a6f2d887bd82a6f68cf4fa5444d245856939e4d937f78a4e36ca816
SHA512a6a0a38d13b35292fda19ead1d7853b274c7879ca039b2472c7b28b967d5da1c1427a3352b449b70f2c16ab6604a53a594dbf390dd6a31b078dbbdc579617325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526e43cfd33c6bad2e64c0088574463c6
SHA1f623ea28f765439b350b90bdc2cc686a813f7f8f
SHA2560889b17895690e2588b68d5c2febbf31af4605a621ed7ee2a6d195223ed97fb0
SHA512d4f57eb4b5511b9e4918f4304f01c861a7315a680e602054bb3bd34feb494ae57b44b94f1d1ef45fa3521b761beac35fca13fb673a37d67d07e5c70e28131262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e233b2b6608168c3d34698dd345b1b2
SHA12fde13206f98444cec6101ad3ef3f89512da92ba
SHA256783f4562c9697939509e0227bea14b4329df8c991ce05c7e0d6f5326f3fc9d9a
SHA512a9519672c8d26e07c81b87892c92e157df7f9cc0c57f65be64e69c831722b3ecdccfe0f9f66702a9a7484dd9e13947138e4133d9f34c92f482741cda48edf51f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b