Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
896332f9f7c40ae10a53fbf7b95ae0e7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
896332f9f7c40ae10a53fbf7b95ae0e7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
896332f9f7c40ae10a53fbf7b95ae0e7_JaffaCakes118.html
-
Size
26KB
-
MD5
896332f9f7c40ae10a53fbf7b95ae0e7
-
SHA1
6c205f29c9f6599a7b81189ca759cbf77219d799
-
SHA256
8040e286d0d21875eafd4168a7b55c7217b97295ed236884258b86ce04260832
-
SHA512
f467fb28babe4b411e0a33dd67663bdf990a0e09d2aaaf14a1b49687af2ed7579a4594705ab2720fc72551932bb382166e7e7dbfe2793a4d3b5b5d488305f4fc
-
SSDEEP
192:Nb53Hb78YvIYb53Hb78YvIYb53Hb78YvIZPN0Gfxh2UU1qtv3pSpaYp4pnbpkp2P:x53H8mf53H8mf53H8mKZfQ5kZjgPtWTZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8017ed0cbaebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35A08631-57AD-11EF-946E-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429520559" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000498452259cdd67f05b07a3862f844f6a179d293f789474b9dd0d66d3ec9504b1000000000e80000000020000200000006c320d11b6ef3bc76f5c74a9bb60aaf368c3b6de3fa93bd6aa8ab08bb20d684220000000ddb8c5cfe22ee96eaf21b7c7e7a4ebe94853f5ea2e1e7a4ef5dcb91d1293ae6f400000002089ecea66a516316a8ad3135688ac1deebe37e496e487cfde9cb432e6ebecfc2d720a58295320708343e840e52810d2d3b18079f6c994e9296f272dcf2aa967 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2860 1732 iexplore.exe 30 PID 1732 wrote to memory of 2860 1732 iexplore.exe 30 PID 1732 wrote to memory of 2860 1732 iexplore.exe 30 PID 1732 wrote to memory of 2860 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\896332f9f7c40ae10a53fbf7b95ae0e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d8f2b90d9e85cc2c7333389ec94892d
SHA1a67d8cc71064eea8ad9a98a2df6efd6fc2b19a1d
SHA25645e9a3cd784b5c7b0427de01b9c4e23569a515cee9753948c0fd708960886d6c
SHA512894dcfa3d09ca1102692147be9d3084f3b68e6c7ffa7fdd8f985a3ba41e8c9e9e3df75c80a7504a4051561115a433990038d8c3a5a9b03b33d47b63b4cda937d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a8ad8973ed900f18f0182b35422d60
SHA132bfa5cce27205136238280c40d4c0d69b36904f
SHA256b4d659f5f627878b790b683dfd30113796650633f2e60ee6fe120c77106510b8
SHA512ae8913e9f0079e8d5f4f0c5eb81cb07658ba201c6df6fa78b80f7689cd13cb88e6cbf351b2d4f4d3d8e4880c746464751651ae713ff8a433c03ee75d53337db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5724a6311530c64589afb88f0d7d56b2d
SHA1c76ad44485df165c268903517f361e565a9ee50a
SHA2564ab52a3b8f5a2a4e7d5cabde12b3343305d4593a220ad3b6504383cf94e8f67c
SHA512eb0c5a5a3514dbdc7766c1c95cdfa009413b21059b69f9364897b5c6903c5f3232668e0b0dca3c647e209eed8fdbadf7b9692588da107e9b5713b67b3853bc5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4f16f8e9d319c610e189d83ab48866
SHA11b8dc3cfb696204363e1808d47344c397ec3d996
SHA256340b162cbe54746e0433a593eb1d1df9e948ce3722d0d8031515aa7410197600
SHA51226b10995ad05b56c277e0e7bb3f91a086f57111ef8be6de80780d2ef03ca35a542f688e60c57ab89f1ad2e28fe0d2ffbfb7b6dcff17f792b3dfe1a0aa981c6da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342a03f8fb59c356d6aea7a33ea3785c
SHA1e0adb59c736bf12c9ad9b29e2a255c0266b216b9
SHA256269734eb755d75f87d4355962b6f236a4a702597c6b5a64e08673112c24d790e
SHA512eaea05760b30f123480ad25176757fbc8908119f8fba0b12326b03581af5fb153affa1dd3527a9b5e31ef6d704abcce433cd278343e4f3804c0ce47ac563a2a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9852fbfb9d17815c10163a6f86374d5
SHA1a82d504ed121d5c2db13aa65d5085d0794bb2d94
SHA256064d8de6eaa6200868e570ed06cd564f92a2ab5a549f3835349b29e12dd6ed49
SHA512c9d9382af7a9b899249a512be710b7053e7b0d459b82fd7dd5b4ec4f227150ffc3965c265e9b95db45178cffe74bb60dcff24ac2bd2bf38b82ce8a4cad2f1def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e58f6386887d2ebedf30d9111fe8039
SHA1526b3d7e381f3511e0f7f6e9d2309242d38015a4
SHA256018e71e9e3bcd05dc33a3c5324d80fdaf77569fd37f6c28d7ff529bf47dec1d1
SHA512770caaa5ae37c31faed0019ab8bcffe07b5e38fc40b2ae8d0722ab2711c48758bc8651609eb9afcc2ced0f61fddd850da57190ce042d9007b0af1dd0db1733c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f83ca9b2dee6f2fd85ab9827bc1a305
SHA1fbe953ae6905302665f8a6af3a653af88cfd3b43
SHA25632e04e7d0ef158a4c545aa2e5756544c92160b5a6cbd7dcb55bfdc5c5f3c5ebd
SHA51293ee290ccfd4e2e161fecef2bb69289d1e4c906b1b4ec5d01fab7337ef0cc2042e342b503f6f7b73e341604ec07d01c06a1ab43bb045cc11f915fc2ef305375f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581c656d40d6bb5e51721c3fa23c2e51f
SHA11b79d2b578c0d1d6398ac16eb7db8fe4a2d01a85
SHA25661272a7dfc014110e076db105f26dc8903e4e4a70bfb20a73d2061bf07d38add
SHA51284ff630a93c28ef01641ab72ad65d63c083c470440c790ee042268dc1cea309f4ea3263fd10a7da5e3b3f2992e147986ce55cdb8437c8ea3e66e20e2df9cad78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55386fb2c823f1d2429ef019b54249381
SHA1488db6943517e0a2310766036a00cf1425d0e038
SHA25610f8b3cdf276047c03d541164149c7fa39bae9680e5715b807d6c4ce79150b5a
SHA5120dc9f8722a62bcb545d9e5b85e1790e3ff832d9f0f5aed722cb4f817a1d8282bb43387a2edfc81c085d5a3f49bcb374a89d59500baa0510e9c138d4ba05c5a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556a3c76a8342300623eece1c4c446232
SHA12ab914f4c5cff52e992d4aaa751ff12c3a88a2ce
SHA256c91e9eab7cb87c2d3d967ca5856c8569d6c0b63bb2bf5f08fdaaec527984fb15
SHA5128106da9885320ef09fc73a81533ff45342ca5d7277eeb62a2ba4c37ff6dfcc863d626f3e75eb470dfe0f60f6e0033a14236ec29cf95ce3f7fabf5173ebada95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e151651821897468c6231f5dafa91b3
SHA1deaba50b86183652ab1a970ffd86ac857bdebbff
SHA25615d71db31fc2b12aa919be6e4cd7e3f180a2aecedd4198e33a4a80182ae51606
SHA5124125ba6be44de4dd86514e7c51edd3d4234471e6dc237b60609f476da181226f742a89c19a1641c1a05d6532a2fbd4636dba037da63dcde1f985594afb2f9309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eee7e35b2f22617321c60df4afe0b39e
SHA100cf84b0da5ea45c03dfb942164dccfecc6bae02
SHA256c2b7f3224837cbd0def790cde48d896729e8a9d2eb2d3aa748a0459c36192b0c
SHA5121c4a3eaaced084bc17552e3a21096e7371ddea827e75e5303011ec781a3634eef69e24a236fccf9e0d4c3a190d8509b68ea88ed5261e218b475c7d7988d1db6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50386f6c69d76ec61cfe63dbddb4392bd
SHA115923d9f58e61141d990c317928163d5ec099965
SHA256e0380e896586ca461f1a09e779adee44010f342f6ab576e15cfe0a85a6bc5c6b
SHA512a49cdfc3f5482bb1a8b27224921ffeeec5dda073c9b410308cd943d91e4b0b1b174be7b41aaa5c4f3d93e52d60c8858ab22985a44c0350e3c13e776adf1f0f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba604c172d00b4cc624c811176871603
SHA12c2cd05c819e04c6746f8354e9e4b6ad3062ff4d
SHA256d8cfba233e6f4f05044d4de6aaeab465bdf1528a66aa8b941270b19575bf0d51
SHA512e726ead10e1cbd1699fa8839c01a24b9d09cfbaa7741c92d56564c61ff9ac9f6499645b7583734f2fccfc6d6531bf5a1ce88c0fe9af4b1c47117630f9cd39b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53320115c36c2dae148c012d9b860244e
SHA171e56d37cecac29839c1d687a3951087376bece0
SHA2567f262b58da9e453e6c85923cd3702a47855ad1b80bb102bd6911990cacf30118
SHA51204ddad6b6b8ab7caa34423bb6478d14d0742dc7c8a46e96e7a69ef9a89ee991151fa43c654e2cab504ef8ec6ff8ee64725791c39d31a5e5039950ac148e0ddf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52347e3de73c2107c7ab6cf351da69b62
SHA1e5a0afdd6347b3d67dc89140a275b23fa2ba827f
SHA2562fb530f356d6c6363e1a56aabac0981ad997ab78a6d83a98a31a6c893d96e169
SHA512b9cd401d0e30e2268378c2ff21d3ec85471ce9d155d911cd72a338fe35ccf6cd54a52d095846e4c7bfbaffebf3be6581885f98cae68a1c2eceaa89a9b5657926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389b55e7728c939f06c7d5de7efccd4f
SHA1edd3938fbec694878c80735c82f76ca2bdc0370b
SHA256612d72507daec6cd155bf27ef503665bee57fee28a0aad084d94b38169d35090
SHA512f2a77a71093fc2fd24738dca98402ba58fe7b320a136c42a0637d45541308477fe73f97c37310931ae937128db6e170a9a0d4c0cb109f756616ad5d2fed312a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb2eb7cd96f9a9bb2697cccf8ce58c29
SHA11e1f09fda8093fe5f9a2f2719f440b4c07c37358
SHA25623bf2c8d6e327d8df8849b6a6554ff9c52267afd782f3cae589af9d6bf1336ee
SHA512cdc796ca47e0a0a221fbbc03d23712061cb582c6a103aad944782bc1ccb943c5b5fe0ded9b27f4af1fdb7d929f00c03d089cadee97e40711c7534f8d76745b5b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b