Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
88b864ed7541a9838f277ba789549ff3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
88b864ed7541a9838f277ba789549ff3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
88b864ed7541a9838f277ba789549ff3_JaffaCakes118.html
-
Size
53KB
-
MD5
88b864ed7541a9838f277ba789549ff3
-
SHA1
162b5a8b0bd09ce7ac23471c7b7de8ff0ec545c6
-
SHA256
1453d4597b78fee5ec655849270e7e0e4d97b567043f401c4c9f69ff21f2b270
-
SHA512
9a820cff1ea48dff3c47aea9c36ae1479412619cea4917b077a4d8b87c4734da8274973d48b30344cf5b6185f9fcb9a6fda6bb69f52fefad558b80c94cec5d86
-
SSDEEP
1536:CkgUiIakTqGivi+PyUCrunlYG63Nj+q5VyvR0w2AzTICbbUoH/t9M/dNwIUTDmDM:CkgUiIakTqGivi+PyUCrunlYG63Nj+qK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e4e42c9aebda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429506866" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{540BFDE1-578D-11EF-9BC7-EEF6AC92610E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000588dc4188e7415f1ea2306751dbf20b4bb274baa619d89c2d07040ffbdc88f69000000000e80000000020000200000001b01fb307f3e3587cbac52cef2060af4cd0fab5831bee8a9bdc0dfd71ccc2eb0200000007637355d93c7638bec381e7a547e0b1ecf95727d7831c2c1dbc7e614fc6608054000000059b01c8d4d06084d01ff7f4806055c67303987f9d9788de98a2f48cd64feabd8db92ba875b964c7f11f815a2aa6e968f39efc89d83cf455380d410e537b75e7f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2176 2076 iexplore.exe 30 PID 2076 wrote to memory of 2176 2076 iexplore.exe 30 PID 2076 wrote to memory of 2176 2076 iexplore.exe 30 PID 2076 wrote to memory of 2176 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88b864ed7541a9838f277ba789549ff3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095c8234b3027287d40643a6d019f7c1
SHA1f68dad04cfbcfa64e87ca04a95637c0f1a655f03
SHA256e2683e96c0f3404922e57c011851e93106e34bd9d8a5e8f30a059964af2bb780
SHA5125b56812a077cd56f263ec021dfcb5a4951cc62a7ae335b7f9bce905f9a249fd65f44954c748a43a0bbddcca943adbb155003b56ca22ec32ba9f189f54ea9dbb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5823124f0a871b6fd1ce788ce3c72342c
SHA1c78d3c3d2aba8351cc9d66563a80112520378fab
SHA256f6aaedf03ba710d7c792a75e37e6e61c92024526eb62d628b4f91f83032e0db2
SHA5129a1ac0677a517f0ae9c958244f379834fc63d87c28f34b28d0a2cc9b85dd93235f0bf9c94d5958286ae999dd989d68a72ee325238529609f5f6590de8a164ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c656146b5b69f2ed6c7b371c779a489
SHA11831740325b8cb2cf3aa248320024613e2072237
SHA256ef2987d8c05b5d611d32d637e00c7c2678d2f2550059ea42d5c1a95d881c63af
SHA512ba163de1c48880f75c6eb3273b47abc9e51c0cd449b0e0968729c506ca27e4530293007f3bd2575327ba31dd53df54ca93a05ceed44d05d3f2dc8e1145e4c522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898aaa9b8d34031e7e7a239190295dbf
SHA197d8eb82584d1e02d8c213c6e1abd4138859224f
SHA256a18743f336d22cba0a73fafc163184291bbf2d676d82dda57a7ebc546a54c127
SHA5129c77faf36157d6ed501823e10c5c854bf5b72fb92de55df406579234af65f57e981efd7c34f8c09aed70b1df4c10c26d73c078c97b72773f7c5ce62f0a1b0df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5669a9142ed596494b14ea408ae234755
SHA1e5ebe97dfe88cfd4467c4c433102bca56183b8ef
SHA2561e7ed47f5818e806f0551b1c70beb6a2094e981d3b7d3b3fd0802750ff558552
SHA512113ea9bc0a45868f762a77daed35d22bb1cd22533b00ea199926d6f06c55ea7223048f75272c74843b9c514439eae31da84347b1cba179128f8bf40a37344ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276bd031b6df695dbe3c204e96f743ad
SHA16b12517ecc77b12cadf0fc3421681c8359a1dbf8
SHA25659b07550e35a4648358628f82c3daa26a0dee64bff8650b357d1ecaac04111f8
SHA5128573bd61e4a2fa28a97b3a149b32534cfa880d19e596071c4f25c16623355b4b3945e1902e3805ff4e86afd5e3be2d2a40c8bb81956e9ec16bad11d85793c9cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57942d544fb1b317ed72d1507b8095abb
SHA1fe2f4f8f50b844ec9a7bbd9459781994b45a2402
SHA2569194cc787fcaebe46c339ac291d821f3b798c5c096052071eee73629d21acebd
SHA512f8c31fa1a3e9b53c08bd2330ff48d78f83b72aba487609f86a075a6ece48ebc60a25e02ce0fd941eea4cbe10339858f8c729a7a4dc6eae62a55a77955bf2344f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c201332a49e3cecf52874f135a60098c
SHA11733f7f2c6202ab9771c2b2007cfa4be8277353b
SHA25697d6af0da79904356c8b3fc82bf51f019e24623f7df5fbf57e8ad97a502c086e
SHA512e07261077a348768e8cb91298bfaf4a7bda07913bc091fd27828c0307d01547e4612a488b4a44d74c4aa2b2d443b8ac1ca9b5b5ecdbac30cb0a66e81dde62462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d8aa32eea12208a873dd2f54ab0c28
SHA13020a71224e75f7987c43e43efb9d6baca1559c7
SHA256e2457b2a3b8cd733bdeb62f74005347be28c919d5e956adb55895d99f61c0a45
SHA512bdfb1f79b90e53e09aeb802614fd989ca7c6c9c07a2e955816dd560398693d5886d32d64c02ac2cb2b873d41b8b458694688612de080777115f2620cbe26bf89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a36eea8e27fb904e66f45e3ae9724f7
SHA17287dc47363f57ff91d6b7bcb83650cb79397a9d
SHA2565c5302cb87fc605fc995a00c91fbbf6a417b7277fd84b26944ff4d29d2a90e3f
SHA512bf70a3e24aa21e12656b0870235dcb910a01e76681b92a3c66a40d301366bb754ee2329896f459a2ecc4e7255bc4421bd812da6716f022900155f205681e6dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6b61424c40746bc00192fda9df5dd6
SHA171e7163530014c016e31bf2f09771ccbf92f5437
SHA256da9c9b9efd393e05289d334703107852bab07e0095eb079aafc3fee3959d1fdd
SHA5123c8c6dad4e4f39c572aa1ab7bdcac5631d1bd3e310c3408efad6267818ec1398c5f212a0661cce89be14520d654e671215294db639069e6373d01ee297ef0b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524aca9b01bfc996855a9e607641c45a6
SHA1d336731fa1967a79e89c44b20b4cdaa2c65a0552
SHA25611f9d36b1e356b41e355032f50b98f9870d4e4fec42daba06e6c58fc0540ddc6
SHA512883336f5659a15a70bf922b690010cc63cb2de09e2732e7dc16445667c1cabcb2fccffa59e06b78c75e3526e8a979860a642af3fe1bdcd721e03bfaebe7964f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931fce24f0b5326ea988e06d3302edc7
SHA1246eb66e14206ab97e1bcb96ca321ce6a42256f6
SHA2568b3efb91c5b252538715ac50b0a7f49bf3f3ccf3c2e8950bac24cc9ef8e0345f
SHA512af4262bb002e68b137f05d08c239e5013849dd67dbf9ea46429f6356feb82adbc9146a3707ead27d42436b4afc3344ba7679ae360e02fb2fc0b72bdebcd81061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edc9741b0b73245b8d0b4ebc90dff9e6
SHA1dd1e7553e05d7e52f7e2982ac027510f440cb39d
SHA256d5c2aaa861eaa845b39ed2ebf6149dfab34e097467d6541ad316c3d2fefcf310
SHA512bdfd47db44a30993b4454ab926fd77da2e1e62fd655b8643f2c589648067cfcb5ec16dd51f797194a4f585e063bf5b122f090e06ab0e43f827fbdcae351c8fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5680b10ccd403b89a776e97db408d5c1b
SHA1a1784b92accd7f904bc65595a864b459bc4ecd94
SHA256301540cbdcdf2b491ad7cfb69719eeb02b3f691c512d80e921424eafa5fa940f
SHA5123f69e68263ce5afd916ddc448667814aebaca979756dfccb577cd8ce24fed88254b245fc07bca9b59213ec7fe3db4b0d0a6580657e6b9491da54987aa33cf39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4795c17ba0426fa741cd9019fd51e14
SHA1f3f799ca145b47a4aa4ba9413c31da4936952394
SHA2567c325f4a104a10f197fe7444db42ce0f230dab34a46d684f2e54eda1e4498335
SHA512ab4fd75bebaabda010d33315ff4ceb53933266fcd4181753bc491bddf8532763f2443687e079e03770b2d1246601d4674133f8c13cafe14ed03e0e0e4e25b796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831df4b3cda54bf6f0556bf93804877c
SHA1225561aaeedc8699a7132d8eed7ef2b31988ecff
SHA256683f10bc0aaa552b748d685b9f79bc79daf8a3d18e38e799e39075eaad188f1b
SHA5126b54bf5784ecc194fedcc58058ebc3d7316a068d9a004f2570e2b7a342d2453863343bd115fb74beb51ebceff0bd8c5ea2d490d68a49889c8ed3f1e20413a3e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5892f560009b91ba15c2b926d14f505
SHA1bf961d6cee1dbe898159c30bb45273dd5d5d3984
SHA256072dbb556892e2e6883e6f36cf5a51e4129611a94b981e6e7765c650a670126e
SHA5126088bf5f58feb7e3d137634b3679c7b38fe7291e395779226b375b2edd25ed3681b0770cbcb4218894b44850a306eddcfe84fa8fe71e94b10347b26cdda5ccbc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b