Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
8992998e273510d0801c36130ee4e699_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8992998e273510d0801c36130ee4e699_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8992998e273510d0801c36130ee4e699_JaffaCakes118.html
-
Size
52KB
-
MD5
8992998e273510d0801c36130ee4e699
-
SHA1
c71993891e094af180891d01886af14059b9a2fe
-
SHA256
3cfd24c7a46a75acd268927a4a4930cbc922816d7f6e00014995e273e3d88e70
-
SHA512
d7d8abb9a0f92480032bc6dd1d54f37bf834770efe4261d977d53be685d8bfe62e89dd35ea9d9637754c374d9d13ed5bde55d9b04fa080570aa08489ecce5c13
-
SSDEEP
384:oA8cERudugfh0icEmKdYsTdo2VgVSHwQejCBUDr75jC0L+YjCBTCeEjCbGcqcjCX:oGC5iKPM5mKftvR5gjsRy7b191nfp86p
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429524411" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DA32E21-57B6-11EF-BB94-CE397B957442} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10032302c3ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000009834f1210b6c87cf31006ebea4244894e36af0f0ef1de848f58a3636a57e4d6d000000000e8000000002000020000000bbd1742cb230a75d4d2ff87a34e0476b6a1c8b304f6c36a3ef7b2dfc23464f2f200000001b3753d4cc453e407717a9f8ed3ff70202248fd5e268376be47d821347625ca540000000d8c4c5cbc922c1a2c64d6aa0352b50a7313a7b1c9eb581e8ddfa334d5a2bc9fdceb743e40519168d03e190cc4e01a2246baeb5ad24b6e965a0410548d8e4e1d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2768 2976 iexplore.exe 30 PID 2976 wrote to memory of 2768 2976 iexplore.exe 30 PID 2976 wrote to memory of 2768 2976 iexplore.exe 30 PID 2976 wrote to memory of 2768 2976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8992998e273510d0801c36130ee4e699_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51913f8b56953293d44d54565c2a98d18
SHA1f1f0565b0441889096895f0df59e644ea26969a1
SHA2563199257c70d23dcbc8e9ccdf87fa11d633dae7a69eb9907753196d952107ac05
SHA512962f2dede1be41b358a2779dddb7425ff5eda322c1ffa9d5938a768cd0b3e92393a02352ceb7fea9c6a0b2d12c9960a0ae6cfd7706762823a16159600906a0f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011b0e963b633f980530d25980a37e82
SHA1a52ecaa27120edb6f98f52471dc2e9d9509a3cb2
SHA25683204ab842fbd1423d6d84efd4ac09abee44195c46c8bd55307beceb398c7424
SHA512cc329879a51fc542d6db7a11b4ebc36ed3140d25c33ceb888ae1b09c1e60d436f8d94080d1bdcf8c2908d7db5b9add1c7445140328f7e3f0066e71359ca531b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec52093a0dd8eefad7a4890a1bac7d4
SHA12616d481c4f430646ec0fb56e1acdc108fae3182
SHA2561f44cf603ae6d557cd71f5dfda4e392b6fa2b92cfac58432d287976ed640b122
SHA512f4902ae3ea010a492c0289a362a7a5f0c1cf64e0a10956c93d447829e28ce4029668bfb6632e8af53e0fcf5460b60cf667d89d60ebcd1ab98fa119a3d4066299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5991b2c9dd6b431b0e069c7868129dcbf
SHA14909244ee4bfe3460e30ef78258307b284ca471c
SHA256a1628b5ade793ab993c0257fc11f93004706becbe1a5834d7c23c020c6fea48a
SHA512fc0f67438424aff20a9dc59bbb5dfec4ad5bb0bef989ba88317e80ded3995c88dd4c985df49106fe02ab56bcb613ea9c81c97178b322dbd75478f7b7e43cb8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5375016ebd502c0d304caec6299dbd0c6
SHA13b446d7e340238631364f8a049e20804f9a4a91e
SHA2568fbc3534e1e8db5e1748836b07e864c8fce299b3066041cddf8422469c1b6d5e
SHA512ef374e8556440c962dde4009f2976a3acb860cfbce9edd4434e12881094817297fc453661ca4ff27b6f527c85b6390f953efeaeb2bf93068ee92133374593dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6ffdae1802780a9edd30342494e85db
SHA1cfe0b6e1650574d66764677b2178fd83938ba276
SHA2567e0f38fa172ae695a9aef242aaad04e362b81859cfcfb1d8dc11faf670bbb6d6
SHA512b04f7eb6f289c0d1a2e11350b9acf328404fe3c201cd9f568921d79b923b23ea9f731fb3ad463bcc8704238bc39d29fd0e1f19b3a09792644e9021d864d4efa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585032216755210d3332a16b388aa54ed
SHA113b4b67e7fdb768a965c59743424fb5436b82ba4
SHA2560a87f30074b2f84891a5b32dbceb97a756f30eac58689860a6e54db48346395a
SHA512047f2f51d77def58a33c306f242f8b3ccaa192b221ed4b1a9c9f4e21eb05e104f76e6905e25a43bb23467b34056437356ae5afbc1b1fcf32de5b3084b3d1d222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7f8cc368ed76e2449570b31cdcad22
SHA1aa62a752a75393f4b0514e6324327754939e73b7
SHA2569519b5136a88e1ad29e267150f79480ee48ce0a684ad3173ef616cd98e140f75
SHA51241f437d5a411d7420235db514d6c1bc1973292a23c631ef58df7ef302f6713fa33f6bfe259f2f84ae7e393cccb6de07129722ad9851dab99b33b7052e2626bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a4d45015a2cae48b051603fbbac4427
SHA126e1cb574a560bc2a9ac89c458e64cf6c386d609
SHA256a9aa31e4ed3eed3b470240797ec5f3647825668b89a2f7e33ff1376264376f07
SHA51203b546d602beb5b34af135f7d1234bbd6e4cfa654e9765a2dbd92af7000c62665c94e0d433284950146f908f51c0f3bfb1031be8acda00f991c17f298a69869b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5611531ea8ac541aad0cf600ac46fcd0e
SHA1f49c169d64d6716b2a59307f5dd9bc457af98844
SHA2563815ded4eaffa41afa82203783565b82e9c8b9a6e3beb02de35bb8fde24576eb
SHA51234e2f764a57d1676b7541cb497c4462a3a7e7f608be14f60f06786c7a7476572008e477ceaac1a1819edd4a0d35d252ba7271716cd5601e2941ee630f6c77f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501113d3ead79438daed04ac1102af0ae
SHA15444e5d2ef624530a59a3c8a261deb4bb2a92c39
SHA25643b0e04bb4a7d756fbb685805327ae7562928d8ef567e5af15c2c74a5a9b5e4d
SHA5127bbea55971f48e92f84e007c6d57cc6cff2e7cfb5a1344c7f0f861c0b46e646413a039c8ab6d38efbc11b6e51d1fd0117d872023894b3b663406d2f4ac24b1aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afdbfebbaea1e25e3c902b5461596420
SHA1672e2c5ee5f17f7ec1ed807a7cadf61c58c97ce2
SHA2563738725b1d5e0e55827ca97107325d5b10f45ea8ebaa641c178e9756605825d9
SHA5129455610bf6cc02a940c74366383bf3228e7f0f5d1924b750be787224be374833a4112c7f72068069f988e31273956e09d811e09358aa884016e6d6e1362c6d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6d9496f663166ae25c04acbef509ac
SHA18626837c4b0b115adec4d589ce6f21d68e9c7e36
SHA2565c27f6f32fb35bb866e9d0b6c1925fc210f3bf84c9a8f31bab35fd81384f50e3
SHA51297d9a9b72184a0805734e2a2aca213ef7a5c614720e3f499895be5dd48b367372e72a0557ee86013159a7b7f01abffe58624f209a86412cd775c712c67442c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b680126f8b17d1c9b1eb72516ec2478
SHA10af7970c5f902f91f416f91a3e7ec06066e572ed
SHA2563aacb75a2c237b84cc9589900bbd2430bd6a6351193fbf9a2d6679200d6bb3d6
SHA512756f3a17279d246e1249bca99e46fb44ff4111617bc70e271b146f1521ba0941067181b58d2e8301d25713ec52e83dfc27527d660db53b92616bea3c0cac6769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ecb9ed300c6d7ee49f900a74d9fec0
SHA18d5ffca2cf8e892c9da9721c9c33bc2ff8f2ce76
SHA2560926242489563625804a13786c8d03f6a753c89ee40c6a1602335c7fce014dae
SHA51268e358c3377ddfa124407cec33ea52ef233ed5bfc9734a86c59ff5b0a6571ad24fd34a38dfea042116d5d379e2f875cb17aed639344bf8d35248f9c3a071363f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c45eeddae993b61b48ff2a00fa28df0d
SHA13481e1073f9903359329b78bd118a4ea1372bd65
SHA256e1b627381613f563285ff2936539078c86f44f044a14fc660cef1aef9e8d26d5
SHA5129b5bfcae06a6bfed6b8cc59f72c3f894eb6b1dce555c7927e92001c293641060fe4027e559addd7cb3b410b7bb563855eb33dadd1a575dfd2f2fdee543823992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5010e172631829a6b137958ea76fc9a61
SHA131099f4347b224080483bffaa047de7306e87ac0
SHA256d4aa6aa5582e7d1ec7ae319545ca52e8ee52d1cf6893f1cd73684a256158b3bd
SHA51250b9d0be18231a1abb864a33c7bab7f9595d99c91dffe4c0308dbf54fa54ab313174a342a4610bcfcaafe1e49e0b0ffa9b6419eb7e83da532ff9c8f8093a88d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de3bf43fe0122f747359ba7fd6cfdea
SHA1e9c5f2ddd6824b3b6b60adb1a6ef4cba8eb9ed54
SHA256b491309399d765a12a0b5aeba9671a6e1d0879c984b00619ba6030c131dd037d
SHA512de8c3de9af0b3916961045139e4426d2a3dcfa421afe4b2a5d21ba89464806dd6ee843c22dd62675d95c73e1f9eaa218dd97c7dd2af51422128cbd7307196925
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b