Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 07:01
Static task
static1
Behavioral task
behavioral1
Sample
89700b06533664668f78aa53d60dce58_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
89700b06533664668f78aa53d60dce58_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
89700b06533664668f78aa53d60dce58_JaffaCakes118.html
-
Size
11KB
-
MD5
89700b06533664668f78aa53d60dce58
-
SHA1
a0277e8eeccec8b30f819f0958980269e45cc4df
-
SHA256
6d319ad07dac3273fec5ad7d2173dbd5decde70b566c34c3b119a58f5c215acd
-
SHA512
7757b83e75660a013d9c0b583d2d10c7825dc04851f7f61db7a282ab70aa9db6f97d1ce838bc2956236d0803df387370590f5e7049204a171c89f4c6bdc3ee1a
-
SSDEEP
192:zIbb6FUKSvu2gGvU45H98YLAC9Sg9Ky9rHRe4N1:zIqdSvu2gY198YLd9S+t9Neq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4050f76bbcebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9766AAA1-57AF-11EF-9EB8-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000003f47f9222c189349cf1dd588d279d44fd7d480422d5ed188f0010af9c0341486000000000e80000000020000200000008a67c7ae7029413cdd90ef9ee29f19211496ddf9ee9315f33e5ed93bbabaae06200000002e5ba2661ce47016ed5ab0d4269241aac51488d83d16ab0da0f71cde2508e26640000000a56efdef0e7a05f9da501a46608230eee7ff997df10d040292444eb47b8953f79abda4324acebd36bea29b141cf1f8e87f7da83d10fd5fe88317a39c6afd0d69 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429521581" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2820 2292 iexplore.exe 30 PID 2292 wrote to memory of 2820 2292 iexplore.exe 30 PID 2292 wrote to memory of 2820 2292 iexplore.exe 30 PID 2292 wrote to memory of 2820 2292 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89700b06533664668f78aa53d60dce58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500cbd5f76421dd0a7761588173bcd6e8
SHA1e6b3875e3ed683673e7c9fa8e98d968cad5407e8
SHA256b3000aa2f284e52538ba4c3813def4294b37d7144428b2e2e57f5158ac1b8150
SHA5120d95354ddb200fa110e314fcd020b3047e1e3b035a64e96e1ce6068bc7ca4af9b3d6214df32511c80d3e4f0fcab4b4e6c3b3ecca0fc0e729aea760eb245c993f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e00ed5d06449fd1c29a755a987a355bd
SHA1bd5e3dca0f40da8f0ca566264352a38bac938043
SHA256bc94e5b67c23397617154b22e5d7dab2a20a2fc1011d95efb9c348b3cfd90da4
SHA51251a84c3ea958ecbd53187c4d350d8da678c9c4c01fa85f7130723e20531c0926ca646a90f4e0b8196120a9010aeb35a5b84efc6eeb418f6da7033be8ffc08e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555e922fc76da8832d02db6436c2bc4f7
SHA18292056d1d1616d6a1e4bd0c7a49913dd01d791a
SHA2564d51a046d42c78ff0ea237d102ab4835db7d141c4bb9350f5eaaa9b44481349c
SHA512b9c431d8e29bf268fac665dd1eb956560262778a95604638f720545fbdb4916b3fbd9f9a0cacc028314ace97d6b811b4a591639286cf915b0c5848a2567f746e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed26d30b9fd6e4a5bc819b2c2a3fbabf
SHA1f56853c2a9308203ccd956d1a6471b466fb04029
SHA256230b0cc89090d3aa0c181a8c861924ea051110c92317c7ebc0100f65b9c056ea
SHA51278b622c8df5a6aba27a1b02b513119812328d163cdec7624decad90acd79021f0d8f71b1be2564eb32fe734f7d9256486a263cdd877e04c19afe6536dc320ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e307b2bb6f2216019d7bf2ecdbd6b19a
SHA173a361d812af60f25c3ee4981cd59ae42c4956af
SHA25607c320e92235b72a58a5255c0c4d5922039257daa72bda7b402b42e30c1d4888
SHA512d66c482497bbe3aeebb2404afaa443f3120b353020daf063023fa03d019ed4f87c25b29eb087d1f44b630584931cbd6dac2b77f0aff4327f6950cc3dbad217a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db1954d617aed83ead68676e3ce46fe
SHA1b41097adcc2556c237242cd8c971ef795229f6d2
SHA2566018c9f854b98c62d0422ecdda0e97808bb5f4993f01dd5f422ff238a4faeaeb
SHA512d8987ab154abeab4c56e2a0f6520b394bcfd8b6adaf6811730b7bda64e9e29b3996e3420bbe9a4c4c3c2c0808a02e54ab71c2ae3362d4a903c5b00b2c4f16683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5497339cabd95901f817f982beadecde1
SHA14256c0ef5b4cd9b42c5666b6d40352cda1d09d16
SHA25689bdb4b547dd5d085c0a4d365d999d325262083ac418d2ac46f77ee1652d76f6
SHA51210b6cd54a777a20abd03e8beb1567d25ce00abb135603e049037390a98b4e68357747faea654fc84075041f00abedb70f77049a597e9c306de4c25109c5e8cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0b1a7ee979b45e8bb3cba7db26d5aa7
SHA1d873964c6b913ab2048b46928eb0508ae801b622
SHA2562032e519624177393ed04dbb77594f33ddf669fa51f8cfb31457488fa731e518
SHA5121d807c8319ba9ef06e41a4498b1cdaf9a7683a8cba62376dd38b5eb68e84cfb40dede097a3eaa57a5c2553731cab150d7bce556a471277c56bd10d1c59314a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92cd40e43ea788384b66141fc5f4bd8
SHA1c0b05591c32eaf5976c7d718bb0d27d9f654f420
SHA256c36dd22974fb47e980b50cedbfcf3327f6058820b66739f6e8ce3a1abaaa6efb
SHA51231487fb664d12148eff9d66f23633163f5c6c5a9b7d26f2d245752c4e7dbb87b7f352fb58c7aa3e7abccdd54c221b6a52c2482fa06623aeb0f167a890d863bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7e2007a55f14643689b57fa910ce96
SHA142d8b98114fa506eca0e4de8310fb91f454574a0
SHA25603761f7a5f20eceb9b965feb045fab51a72eb3ac8e1c22f0984fa8f6028af0ab
SHA5127fb8a766b2cc68ac0890a0fd4cb5a30e9736e12e5cacc818c1108c032f272ce3947765fc2d1310734723f68d20fdadc7fe3c4e26c82430bae5d25dea150fa845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b2fe53d60144adeec8485cec75d2053
SHA1bcdb898b822704ce1d0f6b165409b341b563f38b
SHA256e79dd7bb5e572dfe1343f5a84e777a1ec724d81be8ba0183e939ec5601777f6f
SHA5122a4b97141fb89b5521da31f33bcd73eb6ffd4ea71db7b222377b72f19e04eeb4e9c4bf4d4615a81dfce48e8c06317dfe74d21e8980e6c3829008dbe1b1a5c083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc5d301be80d610c7da326c905fe9b66
SHA1a3b4a69d608030df097cc9326845021dce2cc0fe
SHA2566ab01e6179758b9fdd2cb8aa076d9c565b9652d915e712286be0e66e7ace38fe
SHA5129d76caf8870940a4429261d5e111d2e50e9cf1fdb92ea08a7bc5ec420b66aa7fdcde0dbba5d74b86f9eccf42956da8d0e21f8da6d5fd25a29a84d16bd0fc5af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e900385d7aaf40edeb94ab428eb30e8c
SHA1a12da0f79cb5450fb6ecc2e5f90eed6cbd5c1a5d
SHA2567fa9659d1a6aa0a33dc8d4e88100724c0d10b42e6708c410f35b5f20c3c93fe9
SHA5122b63773eaf04f7fd84a2e5d96ac29ff5d9502cefd5264060f5fa3e429dc8a905b2ade0ce1c60041b815a2fdcce5b21ccf13f53ef7b52e67bb34903702d138ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e186348924bc8fd9ac5ffc1c5f01ffc8
SHA1920e7108d7e65b5956896d5ee42a859e8e89bd44
SHA256007969fac392241fd2209281e9ae7193acb3a2f8e16b73e7758b1b0eff448f92
SHA51239ae2a1f21e5360c1fcc01b8fa74bc2e628dfcadaf19e5519ed643efef81ebe00d37fd6a3113609f7c46885b6e075b3b4909c8fd1b205668d343252ec1228d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe95a6fbcc0f53a3c917442a637c752
SHA1302aada6765afce0fdf6f63d65b4177d2ff45ef9
SHA25644ab22bda5c443f7cdbe7f9a03fd287a9fa8feeb554f4576cde97380644b22ec
SHA5123191da63fa52ddf5434f3a30d42d65a0c78f4ea25786151c0b2d5a9ebd4070eb9417cce3ae09ce7031dc7809dc1bdd86f438b828675b6a25864babbb01ff7820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ce33f33e1879f5322c84368b35fb1b2
SHA1d5caad1d2acc4fb87b9960f954054ac3cacb23ca
SHA256a70d1fe884c170ada1e8c5a0016ccc61a7272a283d4075db6c3b255f60a90c4d
SHA5124d9a6d1c41b8aff36ec9328a49476051acad0e3f99cb6535b4c0b064f527587b0bb566a4d775df3da3b4f6ac88da9c69416540a1b18e204365fdf1617e9c4a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f7f100f62340f74ee4c08ca617e360
SHA1546f21bbe9b7a34b0345aa68bbf5f934fba1ccc4
SHA2566ad3c50e381d667490b5553f46fa9f9778993e95c24ca0f91864cd9e352f5150
SHA51210044810c83ea531f950d34edf388d203c1cb620abcc0ee2f3cab0cca913d5bd6a65b08a19913f3deaf297060b81d185f3fe2f7c6859251504714a2216308b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57628f5320fd6b1d0c4112219adfadc93
SHA1a24db12301881499bbbdff114e8eafae370ee78f
SHA256bcc2797c4b2e1fd94bbe9a13ceba0b93cef4960fb11d07f0401baa4f7315de9f
SHA512c9bfa27806d0383e76c224d1442caa9de577edb0053a84ac8b692410f1308a2627671532c60f9a7aa70844faa805f02f38c6b8532eb60090805587f20c076fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ba456a13eaba98243f63e331be0dcc0
SHA173e53c58aa84bf67b85d717974f5b48ebf11a7e5
SHA2569325d86fc6c2b5c50a972dfab054ccc21f233f58dd34734b41360946d4ce719e
SHA512af77b61193421847ae196de30780f08e820a8e7363bf604f183a7300d9d792ba4691ae01bad5422cc204157310023d4bae085987a6cba72cb168048eaa08d7cb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b