Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
8c47d49c163569b2908684fa0b60962a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c47d49c163569b2908684fa0b60962a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8c47d49c163569b2908684fa0b60962a_JaffaCakes118.html
-
Size
14KB
-
MD5
8c47d49c163569b2908684fa0b60962a
-
SHA1
28b1c90928d73442cd20ba1c8b83a11f710fc026
-
SHA256
de770699c4bf4d7d671a9dabcb3950b1847ef6f4fd0cc1e1cdeda198ca5aee0d
-
SHA512
822fa047fefc5ca6288ec0831b97b2fb265f2917fa1212a94bb7671ea78acaca1b073c422d6fc3fbf56de720318225ef98094794cc0946a8d6fe91251256219c
-
SSDEEP
96:vZD837IRcKcpKnsGz7fppYGuR5bTDlNshs+h9xbs6dFysQJ6+osEz6tsWiK8Xdsv:nRcCmbpK++L8R0+8B5rxIV1CG0HRvL6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429578199" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69C41811-5833-11EF-9A0C-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000031439571381480eeb9970923bf083166f3cace7a27609a36770f8852880de10b000000000e8000000002000020000000f0c7a30b963c72d1a4f20a97690365bf7273838ddd2a2dc102099aaa4625ca272000000024a86594982403ca3ffd3d0da470cd98f1d6103e42bb25676b77069d335d661940000000e77c4f57ca0e9de8c6623dc344c9c57c544b5b5e9229a25677a394dcb3a98192d429cd6ef11fd6c283c592613556ac7087aa92ff9d085e34dc1cbdb325b17a46 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407bce5840ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2420 2540 iexplore.exe 30 PID 2540 wrote to memory of 2420 2540 iexplore.exe 30 PID 2540 wrote to memory of 2420 2540 iexplore.exe 30 PID 2540 wrote to memory of 2420 2540 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c47d49c163569b2908684fa0b60962a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5375d3a1886a68e66f946f5d73e43824f
SHA1804c9670dfb7ebf65411cbadffc2d6a4a4722899
SHA256f60e9f52d4c3fa4eeff79d8cc1c8cea9271d9b588eccdd3db099254d129cb0ec
SHA512479703dd2cf5c4d68cac910b86fc1de1d925e47c3e13782d913b8397fe97dd7d9e0648c9f5430b4cf75e2bfccb18ec95913bb239df9c8ad49be0445fd4eeaf29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76172aba4ab6294c83ac19c218ad382
SHA1aaae4b8962009c4dfc27faeac4be3f0eb335cd15
SHA256007366503a8b2a14a129d14928b99ad1ddb70db02c07084e50ff5271985bdb0e
SHA512ad4bbd549da4859ab9f4d861543f93544775c604bfd2fd7d4ba665c57902950dd96e42891923873e9cc4a048f228c41e50152968793964d41cd1411a130007a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598c1bbc68ece6c6a4e1a03dd7eefc33d
SHA185bf9af38080f7393dce633bcf93c3dbdb6e74ec
SHA256a7f9cfb4e7cc3cc48c63267b997ae31b42adc622140d8aa380c527d0ecf469a0
SHA512c64f443f732816d560e1f4affb615276c8f767826a06eb53bf3fd4fa3968aace5f4f897e8c64fb362397e228ae3eb68ac3c3b57fd2ed4a65b8010090c1c9b2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56454483f4a6cb5b1eea4085434b65ee2
SHA1500ceda15568bc56b96559d3764e49a6d5193695
SHA256af02fa604e358d0bd0f554d489e670ea9bb943b3a7df68fdf26b8ac43209fa92
SHA51261aecc290153e08e5695fcc632474e2a57d099fe0c06b894925757438a457cf71b42daceb94c74e7614899b84363cfb5154b8e95a1abebb5aef66ce9ce53ce2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c097f5d821c710090f0d5632ff93e8
SHA155e087731c59de2dea63c8f4070f2cf62ff35930
SHA256f9b42a38f5501ac41d5f19f30e54e081e5e0231ac798af5f3a133d2823cf17c8
SHA5125b794292f11663035ae1527a31fbc73fbfbea4eb4f9230b951098ca125a527accee35a5a3a02530aef979c3244feeae68a72a207277bb7fc0546048482ac0660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621dbfce82a90b90475d560ce69c5f2b
SHA14d1aae8b2414067f5b091b8ab2af26329b96b74e
SHA2560ad41813cf71ddb99a04588268764425b3f3866ea5dc9fcea7445066f28ebb68
SHA512b2a5bb4324c1449dcc4cf78af9ca7fa2a84f16958f36cdbe3413b15bfa574d1ba994b2de1b8c6c9044e054e0933757c08c5d4cb60f781af4a0967ed4fc6e8737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa029ec665cd9a90d3d779d1f6cfff49
SHA16bb21c723deb37c8819ec65693cc3477798f9147
SHA2566fb9b84ba19d8c5deb3229d02fe167360eb254a200297b7090629ca6b0ac871b
SHA512ff40c974fdf9765e051192fd1ddcdf1f3e90ec6d9b4f978f4de63854b2480843ee39623baeb7f2397f416710a292618f413f6c274953e7b6298151d30de08c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e3fca711693b8d2beb7ea1c811bf572
SHA1028dfb91006d41365ab555284797e20e9b9d67d0
SHA2568cdc094ce4f08345d2341096d6eba19f5e1151d41a8b99cb988f0b2131b6e774
SHA51218981f8675b64607dc719d3987224fe3c4b11e80cdf0f5fb5864e9d0f03fa5217ee4291cf40ef2c9a39a985ce960e2b719c9220a7041cfc60c1bfd4255a34208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5acb6a33903474813dc5bd95754e85a
SHA12659f9eaff1435120f321d63182414a4b9d80cf5
SHA2565f341ba34969a994b68307ef47dedb5d78154933bbdcc6e1200d1a856ae72ff2
SHA51220e866f056328016e3f1f0f27fa66c81f21f2343975bda7e89faf8d18489aa9d3523e3255b689066e2f706b15a6306388e1368b102778191de12fdb2f854fdbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db82586c942d764448958fcba230dd5
SHA131c1d037d8bef0d5f60e4bc05c276294c2bbf7b2
SHA256dc2589f8b4eb36aca83162052d594577ce14f78a8205610f69cf81159a44846a
SHA5122da2b88dc20065214c81e6f6b23c2f3afd7713ad6b943056cc675863dd98529095e383970bd22fc0eb38bff4effa843c8b5cbc13664613b5978e0cdb37696224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551b9c2f0cd1df0a8e45e883ee7d989f7
SHA1a2aaa26ff1299079d9cd6c1de249430be6862ff5
SHA256b841ea3c256b9578a5edf56275ee6c855aa8a76505c5f5c04a1a13650e91bc9f
SHA51214ea682a711f1bfa3f37b2859a842abbfa75ab0341efb0e50329dcc080961ea6f878d20bdc251f728df751a6c56cea19b5d55dedb406e51caaeb902df4532f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b61b570d878146e9063218535d1ab2
SHA15cd066d26f343fe20f9bb77f19ef0457fdd339dd
SHA2567084ca2ba1c9637602440e47875f019b26dde3115d4819d94ec121bb04b8b9f5
SHA512278e314fc886bf682263742a5de9b86a7195bfef429ae836e35099634b1e64d7c127d1508f4847f1e301750def1225e1fed3b0d2b57dee8caee9ad922b739398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a4f4b5350d402745ff53ea0b58f95cb
SHA1fb6520b2c691f3627cbd2713d6f6426fc4618924
SHA256fc317fd6abad3eb975434029dcd914ce4f9426a9a4ccfbbe12fa093b054ed594
SHA512975367a1dd75da5bc1e54462fe037292e199b7b63ea000e742bd608ce8284b32ce4fce661b2e070019b4f233f17d3c105a07eea932c616852cdeaccaa23b4e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a660becade637331685ef1236d9499
SHA10ffbd5100fad2910e83a137cc0d8d8f0fccf12a5
SHA2563b08ec8cd07aaf181999953d7880939a93cb6c2e370bde5d4a03a842ea73bd31
SHA5126fa51b7c55e0096a0ce0bedca2e3dc700660df83b6bc836eb890c3fd89eb83a7c96cac0df350e9cc14ea73bf541c8cd51035e584eafc6d77a9e0e1d9e4d5fcf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532465e30cfbea37465b9e2fb5445206a
SHA17e16e993150a5334a161375b91e9dbcccc2f56e9
SHA256a8c4d005e5bed92870f99d1803b9618ec710459064a1d937d59c9afcae204b68
SHA512a7c8b51905ce8c66f86e1902ebefc0feff6b748113b3b4c33ff8ae494eb0d3641b5bef9ab6ee5dbb284a8cf05850c88a4a27730b69240a1e00ab993bbdffedeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5193cb43f881284e75269c4bcaaf30ba7
SHA1de97f8719b40eee8ed53ee59aa8f06e8c0658ce2
SHA25670306bff5cf34dc3f7b78bffa02df0a0848d6075bae7bff427b1faf22160f017
SHA51241b046c535eb522dc24cf287ad473bd83014cbcc7b1244bdd39eaccb9bd8c894cbad2096456f993f6bd39ffac8e5bbca3ad1a422c36fed4ad3cb9fb138b8a0c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55659e8246999b81a0a8accdc39039fd4
SHA13663f3043a76a9a29ebb3778d62563d456daa2d4
SHA25668108287bfabbb77c837261a5cd8635ce42bba3d877285080888e85676e6cc45
SHA512830ccdde40bf750301975f4d0e22fa5cf706216c8a3d9c32ee88331056b74ef2c8d5033ef7f1101a30a62b877d30f9a8ef07a01e240869efce704f2f9e1ff84b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd244a35b31a5ace1a03e84660d0bd8
SHA141dbae9584baf60aa98ab4ac5fed0b1953172fce
SHA256dbc4dd5885555f46385454983c23badecce25cdab51b3d58b86e5b39aaacfd89
SHA5124627797cc3ab94c556d5df264d714625aa19b79730b8770b8f66f57c5fa59956e56d1666a2662988314975c500813dd34b8d7a3fb5256986d31e1dbb9701915e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa539960b568d6de1f6e18aac420675d
SHA10d02da9fc17f02787ad564f2c734c563196d49db
SHA256c2d138cdf17251e9d42446421491d417709009bf846361859bd6dc41718b8960
SHA5123cea73388f41e860f8112b029acd60e5750e619a270856d60f6731d69a5072f6d61c749e5ba193b50d294f615e588d10a9ea958ea5f7ace6f09649a37065060a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b