Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
886c234928279807d938b168b426d32e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
886c234928279807d938b168b426d32e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
886c234928279807d938b168b426d32e_JaffaCakes118.html
-
Size
9KB
-
MD5
886c234928279807d938b168b426d32e
-
SHA1
1cee3f6ab3c93739595a5e3af17a37172520b3f3
-
SHA256
4c8e8b95f02ba9ccfec21d40f11d475b77951668d56d0491c3dd967c1129c3d2
-
SHA512
b9e83c4f8999919c271934f603fb6a16d17e5c794cbe6a35f613c36c01d321cfadf4dafe14108e06af644ae14f963504fca53794c33bd26fe6837616ed05bb9e
-
SSDEEP
96:uzVs+ux72vLLY1k9o84d12ef7CSTU3wGT/kPsdpUlVHcEZ7ru7f:csz72vAYS/ugmUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000d6c15356eb8c9bea8490605263d5693e2c9da335c1f01e8c7cbc609dd3d0f278000000000e800000000200002000000025da8f4b8b1014ca321b19cd93e9751d24d63128df3b49ac9d31d6bcb1e4c9d920000000046d3f40ca69f39cbba2737b77819b38d24c65c78a57a4bb5e9d9ed7cb8f193d40000000e91b161fe338155f0a328c27c391bb0274b2c547b10bb7293788dc62822dcdac0659e4cbc5612c7ce9bb568dbfaab21092bee39c1c35e1cafefc185944a6ac55 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d7dd158cebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429500821" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40E4C3E1-577F-11EF-ADD5-E21FB89EE600} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2808 2852 iexplore.exe 30 PID 2852 wrote to memory of 2808 2852 iexplore.exe 30 PID 2852 wrote to memory of 2808 2852 iexplore.exe 30 PID 2852 wrote to memory of 2808 2852 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\886c234928279807d938b168b426d32e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f59a66bcee22ee53e8acbb5c06c2de
SHA15ac0c21e22ccb1612f3c99c60e777a000e6e0671
SHA2564064c40a07370439a775cde5268953ee0918156c36ecf52e80bff06348b32278
SHA512242c55dde00b280130725a7070b85589807b09bccf0c06a73bf73bf38339ab529a56fbf8d30d50abc403eead2831b9238f66390424fe79206dfff3dea4550386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e90803366a39d68dd1d7698c9ce522d0
SHA1677ef5a3a24269e99fb30307f82f6bb29f91ce6a
SHA25671b144363bd23876cc906a0f848a8507c5cccb48c2849495207f4c6a94f07b02
SHA512f053ee1269f4bd1dcd3676970f9725b6be72acc65d28d4105a4eea57b022dd1f901ec04564490ec6eb8d3be0f4da826f9aa9386912b06a996cc9ffaefbfbf81d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4898e7e8a361692ecc155ef5a252db
SHA13d30f6f633ca283d09aa0f68ddcea46ede3d8e74
SHA256bd2e91c43548235c7d7c31dd96c4c1a6363cd2bf0b41048f8285d47b49278953
SHA512c687af979e3dfdbd2d63f8a96c12db41e35241708a29963b9b3d8237616ff608fe8b286cf61272e0a3c9b32b42a4d9415c451d36a82a01f5d035bf777479aef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595dde383f9dfc83516af22cffd6816fb
SHA102649875eafc4e0d3140235bd33195e144f37e74
SHA2562de8b94c4b878534a2201fce9684f008b103ac5e32fcbb097b3035007ace0909
SHA512306555a4f806bea3882ed649875284579765552b42eef2354f5d2176fa477f6a8eebdedd50bdb6c68469f1d3c1678a342e0319288a40b6535c1264a6c1ef8791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501a5a6a2bc9ff8751824741724d28b93
SHA19ff61b1e4ea91c9d58e635e6a94bc01c3a648c63
SHA2561de017ee6a7da72f0df6430177429ed7ee6849a2a37706a7bd371af6a0e81857
SHA512e7db2ff2f856dc380c67fe16cf4d5ff5c0853d1e39074036060b6a29d4b96e69f5383957fcbbcec7b6930b1b0fa2624a58afb364f1aaeac6c95c362a490a0e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b5e5d91480f646601dc1a14d8bbb7e
SHA190b963f919ee991e8b3a92cbdfab16edfe0f6100
SHA256d4ce3ab7f271bd9945bf06a04e33f7411ec33cf39c3285308582257fda70ed8e
SHA51279adcc025bf2ed6a774cca66c76efd4514724328ce1003f427aca6d81255fb4a202d56634de31984c98c7a296fa4114b80e8987fe20877a0655e868fa5c1a03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5172c87ff9fda46987fb21b58f03c6c3b
SHA1d24ca84ed1b8294fb27ec23ecc63eaa98128630b
SHA256f3346a29e590bfb23cb40646c49f5aa8334c7b765ca58e69c534ae29fe117b10
SHA5124f272d383481b1e6ac0e4ca6a773d8a96a3238b6a36f12593df7eeec18fe4eb5de866508641807defca579ad4e23314fa1c5cba9e1460d3ec7a119d304301ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f3ada2bc6ca86fb44021a1e4d131ada
SHA12cead57aeb6b96aff66d6249278f623827b2758b
SHA256e5bc828edce268a93803d8cc7d91df0758c2719186565a2e1d53145e80cc2a99
SHA5121cf90d5957af9e4d73bb71819081ac50f1adcf0b9ac5b2a71e3c8f0689823bea98ff54a0121d0050757d8a230dbb5267998f5b577bb53f5d23f672fd691daaeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ed2ff0240e71b5b163c8f42cbb5a48f
SHA1c13fab8fbff132d595ea81cdd2881a0817492631
SHA256a6375df227264e52b7d0400bddaa1bc0565ce13fec5604d9eb0377677ff50580
SHA512be771aa945fa0cd59a70cf00735891ca9d1814721be9cf278607304638ba69aea3a78638d7c657eab69e847da57d3cdfba2b9a5be9cf1ec67894501534de3a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4288d9b7bf4951ccae04fd419633619
SHA1f6a2033ddae3abd84f9b3a3a6fc93a5de9ecc981
SHA2562e41bba719f3ce9d5067e2aec321866438711c81ab36562800498bdb498f652e
SHA5124f8d8f496302095d3091c0a50c0bbff898174aba1404155575595e448b21ba96e7887adc33ea91b125380eeab34ff2d7cd2b3f305982a8c0a05c4d71f0217a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f8ab662bfb3cd295dfad8c917fc8b7
SHA124c97f235ef23d0016b376491594509111b4ab49
SHA2561c07557addad6c0ceb3109fd7ee3380fe6c488bcd97c70219bc5c403648faeca
SHA5129032a39f61f8c476af3a8eacd5f83a7b2f0b9a95079e4124e80b1b733fd929ab4747523378155cadc4428b90e7206fd32c35df0346ec690297b2e0ff5bc89556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a9658ba2dd0a7763e825044595b6955
SHA176e050bcb6deef861ebf2556248c793a9e0a63c3
SHA2567cda02633f0e2537e3bfbcd500ad6b08febe048484934d6ab450ab9327129cb8
SHA512145d04f7ca68ce8fa20887c101cfdd3ad64f753882073e9d3313725193c0a018521db4fd239063ebd43ae53185d9d21e605bb7c6b6b72f0a1c1b0ba39b02c809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d1a2c582f03189d355a3bedbe4701ae
SHA1f9b7dedb12be23a9b52e58607176cc2fde52b9d1
SHA25665c774202b8c1b74d7263adb13cf77c8f96a663a0fd57d5afc94ca2732520bed
SHA512c214833da9fda720bea076ac77b4530d74577846b6b0699e2d703292a42dbe55838ca7c148d9e6380c2e4c3f25af1951de453dcd352bd9a2deeb6bf6e1ddf582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4d718901adc595d942fc231d5ffecdb
SHA1c31c8ad8cb4411383e1fba19894612b155fb6792
SHA2565a6a1a6df36b987c95ff2f642afc37d442acf8548e88e63558bfef30704c3e41
SHA512a508744858e3f4cbe165ff7ddd47d94e3d1fd76c467b894567c041c234780d65da573ebef38425fc39dbe8229b7f0e00720e217e258f38b09e384599686c6f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a89e7cd1324629860b8d85bbbb0906d
SHA1ca985fe8bf5de648114d09a4f98d2a207a64eeba
SHA2565378e8883cfc68eb78d94230345deeeb7c9453ac58701e2663e711f357baec8d
SHA512fe9f45d2e3774df2b1223297351f309799f2b363e5ebc6d871558e88500eaf5113c957a360d47c49de0b6ffede14784d44132f0e00f4fc9ff0336ab0e0e2a15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9efee98129710b346f9590576f64be
SHA14d09e7a279d6eaf0bdc1a3e237687d7bbe11ee74
SHA256efa2f1d7906ebc362a7721853f7b6d8cfca4899811edaf6eba70dbe48dfc598c
SHA512d9242384cba3a09062bc70f8851a17697c1add7dd38ca2f5fceb1b25dc82417430b3fdfd32639090e2738770c65c2acfe1478c03fc8525d43b5f18cb8530597c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562582087cb9f09ef58501e98dc437185
SHA1a7829e349c6edc926a5c713cf1fbe0b77cd5b6ed
SHA256ebda7ceaff4160e903f061a99ad9d24bfbadb3be4affc1b9261977e072ce9960
SHA5123c098509cfe1dc78568e4381511ee7f7e3fa9e43207cb289ed6f1e732482a58e57c6ff740b63297d104d5a511f18e58e9a93839afb8e286d0e2832bff77c55df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a93d09eb015a389c1553569e07c9e53
SHA114e405070a73067fceed80c3d407c30bc41872a0
SHA256c2dacaf9b00c6278d917c3e92b506f716d3e9a95c3571b17ae24d5d396492c4f
SHA51239690d6e48b9d48697b536369cfe12e1de3342427a6f1d06e68cf07bd2d9c2afc86dd2a6a5d011e0fa2872d163bb6c2d70e314debb55c9d627e7607893b9271c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e15262e47c64a7eed3570e01c966ad52
SHA133de5b85e733405841441a0f75bef530d5973405
SHA256220d5cfa3889e7513967a149ce522ba6bac6fd960be4fbd6ae88e031a7091b59
SHA51235bd6dacb3842cc3c67dd80628f165aa4c922f60a06a51a72ac74108222c4a80584ad8878ef978e240020d590a26795bcd6ddbf306a2dfde3c587a2239055d34
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b