Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
8918f16528a34144fae3b1de8451c55c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8918f16528a34144fae3b1de8451c55c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8918f16528a34144fae3b1de8451c55c_JaffaCakes118.html
-
Size
71KB
-
MD5
8918f16528a34144fae3b1de8451c55c
-
SHA1
723b6dfa5a17e07524dd0ba8670732488080a745
-
SHA256
fd5154ccbb308296ee2a740e57f0d9bf3d33b371601ef2c88801dbbc33974821
-
SHA512
b9a4a6f8a29f37d3b52dc5fe3cfc00357fc8f191a53fc277c360e096bd4d793bda183cca40c689a894030d2be94c57367975e7fa5a2de9b9b6c88748ebb8addf
-
SSDEEP
1536:TmcNvkTrbu8VCs+tDE8sVpQ9N2q5/8IcwjA/Jthlg6x:tvkzuqADBsojJ8OkE6x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 604902d6abebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000853d23813c3a478c29f0499d96dd79f0e53ae942e19214b2b0b9787cb422a839000000000e800000000200002000000033dd449415522ec3d35e813854d461d36e7a3ffe2366a74869b0296b38efb8fb20000000ff63331a3f8e2c1eeaa86b11e958313d19a5e95dcf4e3c306f755c2942bc04e540000000586f1cb0599ae43c02c7afe0f9b1f8cdc90603dc8244ce79b2f32d61ec620da6e23920681f8344fdce76264cfc58016ae45e38627c9320eb57ceeaeda826939d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E4D99F1-579F-11EF-99AF-7ED57E6FAC85} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429514480" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000edc20b6721cda378fa92d0e371f59edca052999074458ba1b45d6ecf8c69a0f9000000000e80000000020000200000007335a432972fcf91df40ae71145a019cb550316cff1970cfe50ab098a7c6a1b090000000920256806fb297b799c589438e71e375db8d4f6c9eee97de88857c08c17a44f192ab403023f2758181c7e1702ce4dda170c2fcccc93beaba8c2360d61c52c9274b55c92b829e6da0b901b6b0683cf2df55fdccfb600b1e84e129d932aca5efbfd4e1c9e765c960cee8be3dcc658e9470753d708032ac8e38c40a4a6ca4e84f2f9436160060b5e36e5628e3d8f822559340000000f268528d6f0387288487374ec5618d0d3aabe674d596dc61be77ed2178460a1a86895c0c02dd89038358e165b087006d48a40f7b65ccb86a1903198dd4f58f0c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2208 2124 iexplore.exe 30 PID 2124 wrote to memory of 2208 2124 iexplore.exe 30 PID 2124 wrote to memory of 2208 2124 iexplore.exe 30 PID 2124 wrote to memory of 2208 2124 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8918f16528a34144fae3b1de8451c55c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579df8762a9b26f0adbb98f34fe64f438
SHA1a4399ae3b368420df9e1065cbcefe1dcc8307e7e
SHA25619c7e18a9f01d8abb40fa9a0fcaef0bed9227cb9ca6a363c5de851e70fe04f78
SHA512b2f6aa8aa31a8a42218ed834ede5673f3955b94bf8824236c718967d36490fd458dd92f5277be23d2577b5051a211aa18e6a1c7876730bc68fc7b7f417171317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598c47b18656ed19ce99d2ba65ae2b86d
SHA1b52c453f452b5c2aeefa42d0bf750bf9392c3f7e
SHA2565b4e5a0e8f82f96b765ded42a43c33eebc8ff2b89ed9cb4931945f7cdef17753
SHA51249f215c0611b686749c5f4aea12d7a4ec3b6cdeff162aa12b78836bc676ad1d73f6d3c5f3b7ab2a3934c545976055ee50d2931fc29ad04cbacec721227486f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7d333e034da2cb608bf6fe696c6e72f
SHA1586e0d8414d2529df129730b215fca0b4f1ce20b
SHA256788f6ee23fe3582c397df740d34428bd551d894dc8ad301560de8e69496752e0
SHA5120d2bb715ecfd06484450b90be0f82873cc6b7c5ec2d722bfde6297bf7604c332aecb95c64f6e2f723073e4bed53e1451211de515ae84bb18ebf666579427515c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556e463b96ccfabde952e93a317a1898d
SHA181f949c8c24f47ae0147988806c23e6f3bd0ad7c
SHA25657b874a86973c4d72546c34121b325174f80eb27d888f476f41e423ff876d107
SHA512c7309fddb0c48227eb22882f3fe0dbc7a296a085e50d41adf4eed21143b2b5d6975885d9d3e104d74d53778996809d34fba3aebae1e844b202f73415da0310d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558cce019f7c595c97b311c2cee882497
SHA1b636f827f4c8f072b644a697cd92727cfe667a2e
SHA256a70aeca4949ad1381a7ab2dc2f724be73dceec3a67265238a3fd4a127e04d1d6
SHA512c88f5c141a1315205a60fbdc3e1e905873e2f3b1e7b4268fc0ad41b0a45759592220bc5cb9eac240c77d3a33459435ee42e1fdd86e36df8e4478d5f4906144af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5c9f3a4315efb51f32bd87b3ff8370
SHA10ea8c4fd980d3668c0da2e3afcc1061a30bd3959
SHA2567b9930f36b40474c1ff59fc3712bbfbb641f72812ff919120c4e8f64bfd77676
SHA512eaaa7a9d92190eb105abbdfae87daa16a86b56293236cf24b7d4fb8f2fdc5765d53276bd97a8a68f49aa48ade78fb15823a1690d24eb2aa2c5238593c7056558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56202786f3f66f8992e9f2e5c8bf328
SHA1a670e0ae8e4d0f34931388dfa93f4b167270e2ce
SHA256920912e81e5da36486ce4fc922299ebb81c6a6b4a849334410356b68a8597b7a
SHA512abf676aebefe13765599c0bebbf6da7bc03920d709de9494540c6a0f781855c7c15d2967dc7a85a8b76bd34a10a4575280f94753d5a2bfdd3c921b24024823a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2235d1765a38060c9632cefa87e9a96
SHA1723b6d2f0191b1d4ceca01fff3faa66d5605281b
SHA256e3145fe045d34fe5799b792376450a48ad6eaa04c900268e7ed5fb7405f96923
SHA512ae50af6d25e5febf319b7b70aefd63a9564f0506370e479ea84d61ecc3a336cf8c12206e84365e6cc303c07a07bee604dd569bbcf30f471c1a7aa64064a0315f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf166009687737ffb5eff6d5fc81a4b6
SHA1287c54ec30a266b9ff88167c6fe67f4262dbd93e
SHA256e00ce475e8a65c525a6934d472f998cde1ad08fbe76ae54eb2a8ab82c58662e7
SHA5121879ae49fbac825690beaa4bc925250cce635600816e34a77f6ee10bb861009b89eb0e1f770d4d88a10ace21bfcb3ce04cfd97c57118416e0eda16ac03904508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550148c3008a913070fd20b08f3322924
SHA1557cad5afa0dc6beb47e89fd34df2fb2981ed00f
SHA25613fa9fba2efcb6e6927ddc4c1a58bdbd1be41b01ca7b5cb0ac322a7668afffa0
SHA512c2d2a93ffe1f1abcdd1fbcf7e20609532dd85f73fb73d987c9595f134dc833515a885ffa76ba7e79b444ff42a1d45898db4cc66feb725d0c26ff78a219c65dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bbe7c9cd9f3ec0ebcc77a6e88425a6f
SHA1ccb4ff610d9a4d5ac91ebac7a1d7763792312e73
SHA256807abb3f78e7aed799e5e4c9a359d7e113f7084849fbd0decac045f20d4c872f
SHA512603d4a97ac59fb87d9a7ebb3ea73958b0aeea062208d22b244a5413c6ef6a395ab9c9aa5f1085803a78551e8f5a10379325954122c2cd217783f95e0f1dfd488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d10e6647c9648416f214c29fd009068
SHA16ae3a3433400ce8972544aea8ef62a3e25373de8
SHA2562e81fc415132d02b9cd879005b8bfb0b12fdeeea7e9df855f078aa1254491042
SHA5120ec175505638b96cb9fa53c9bd9b0a1d84cfa6faf92e1e56f54995c1797d87e04fa855b63387c9a2d933482c6b632418129681eb604390d732eb056becb2728b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8b6e1d53a7153ffa9c8f70be4f83382
SHA1db6a1cff4a14d5efb75af78cf7fe450810752344
SHA256b11fd68771a383f15b8f57b4ad95d1f47e2701c7d402bbf244fd0c1ad1fa765d
SHA51243b235de853b883b2b40c24dc20ed3a3a565b58224bc5693841a1a9aec0f662dfb137aef10ee47ca72656ff7df9b3b9e0d001dd6686d496bdac65797438cbb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a858bcaf0ac4d04ff6cbbf9338cb13d5
SHA1929205f9b0486051456df141b1d0c8e3890b2bf8
SHA256ac412aff2a224b7aa2542f50c0cb40838066ca825cf2e0873a20661ebf85d7f4
SHA512af6b5306c40b3af8379c4e6b9b4935cdf739a7743d1e29aa82586f3885fc979fba90d065d515afeff3044558d12ce5b5d904d38e9210d8b25b961848acf078e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01d8591cdc949337a7c790dd3474c1b
SHA19ee289a60388f951df58aaae9fc5b42c405b94ca
SHA256dad30da58188ecb3875f4be08428fdf2886eee5739fe870fc89a41e3f5b27e70
SHA5123c64a134aa054d49e5a3fc2e8cacba3b1ec5de9320925e993098075a9666caa9ef529d4d9528ac60bdac43e08dfc14031d0136852022580485188f88fd79325d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e64261f5bc6fbe30d008add7fad4bd30
SHA1a9136c0c07b859e17ca3658dc1b2afd01594c769
SHA256c2a8b662601a8f72ea9e2b026deb4dcf272bb23b70325e64922760b6ae629ba3
SHA512caa7bbd207e1addfa60b0154aa98f324119402769ed0c47fe311d5ab7e0bed18b38d939a547b0775048be941cabb712895a29018f47c8d50963fb6579612c68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887b6ac68a29765ddf99aa74421ccebf
SHA19d4b1a96abc70baeba7bbe3a8237352c02797ae6
SHA2567482d68bc13c2cafb6ce92be2ae5b8a039e2cbba6e527dbd208b5cb27d8a1cdb
SHA512273fc6e578a088534314ffba7f8691f56c6c21d243c70c27a71c4fc2b19f5df732873ac26d2785a1a3a0bb7a15134b91644cf28cc52373be7c939cda0ae28e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5053e24652b0d367b49756a23ff6ccc47
SHA130bff4267d7bb7def7decc484fb3be4533b5069d
SHA256565d3feb2e0ef41192d15e8760447cf7079691602d2d55d86b8f997e8f457740
SHA512951128f69182027f053c03862e184da21e4aa33641eef5a4cfee7a9927113d472b4b4a7d0f64e800d23759128534b0163e02aeaf62f898a0b286e1e35f2d146e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b