Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
89bbf0de8c0be431755c16fc338d4f8c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
89bbf0de8c0be431755c16fc338d4f8c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
89bbf0de8c0be431755c16fc338d4f8c_JaffaCakes118.html
-
Size
36KB
-
MD5
89bbf0de8c0be431755c16fc338d4f8c
-
SHA1
f90ea5a77ff9b67e724c60f34e45367680a9aad3
-
SHA256
5e9b07172fd61345838154ccf27edfdf5e7a8593b3c0d5711264995c9e02270d
-
SHA512
85cba0978e5c974d0b0bea898b2828f9fc4c95509ae7c951d1092c1ea42f016404d6ba171bb3a656984dc6a7b6615a71547e266224e09008e119713989af49d0
-
SSDEEP
768:zwx/MDTHOQ88hARZZPXkE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TOZOF6DJtxo6lLo:Q/HbJxNV/uuSe/28TK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9428D751-57BE-11EF-BD1D-D238DC34531D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429528018" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3047476ccbebda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000e61167bc418ecadf95e86dfe46d0797ef568dad849d0c1aea72cb403283dbacb000000000e8000000002000020000000d0bb8cb50cce9f8e1b014d2fd9586d4f5b9f27ff121f9a6037a73c0f312aebfb2000000012de3f344bc7f2331f1cdb6d24009b1dfa5f4d049cebdba31a0307d89d6071db4000000009bf481969623327d284efdf61696929551aae71342b179155014fa91aa4211fb0b2489513c699ff1df1a2a22d6dd0699c834f9ec3a259191f7cdb1667e47da4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2900 2876 iexplore.exe 30 PID 2876 wrote to memory of 2900 2876 iexplore.exe 30 PID 2876 wrote to memory of 2900 2876 iexplore.exe 30 PID 2876 wrote to memory of 2900 2876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89bbf0de8c0be431755c16fc338d4f8c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58d985e08eafbcfbd9cfb401ebed13886
SHA179c255d73c5eeaaed1880fc9f725490723e1d54d
SHA25601b00943e9e65be92592d5b686b36b32a57ef8aeb02be7f427ec6b0e3d38f25b
SHA512828c8872eb0dfdaa06d82d319ea097a0ab50e7cdc1ccb620989a85bdb8fd354ec0e8bf1ed6caf3f393611a338320043b692b684d10ad98f94119aca68f5a5fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6b34cf9aed9c5ea8f0028c2cc46c7ec
SHA18cd6355467db99959020ddb89260dfb51d170cf6
SHA25688b2d2572b6efcff79286c35360d560015a374cb18d3d3d7dd7978cc19498d27
SHA5120d9be2f599dbe2026e72e0e64bd960a656926e791eaab4db8b52b4da19d4459d9a2b8a3bc9d4d3a216d7b45824f6eda4e54e0cf06f9ace3a129d21815ae8af37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741700ed530b6ad5ab4042e381aca0e9
SHA1d615f90c8bccdc89b42522f7ce1935f685a3e807
SHA25653c2d2fb489bbfe92becae959ecbd71d4201fe38984fa85e8c8fcc39b783c161
SHA512e4746a7e8e4c8b7595da7bda7de7c22d32cc56130a1db1cb376515e6a2a5e730485a4af6509d08934a7bd649d493e86abba342cb8c5392cdcd91587c6745ec49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58def3e700c6b2f623fa885f7cfd7a6b7
SHA156f3817e18def860a86cfb5916ab3bbd749f8c2a
SHA256e790e68568f1501379758d3ac0bb521d8bc691238cd7055a399f573124c76fb7
SHA512cb9b3741275544057c5d5bbdb012fd0e233ed3db72daab03e176f7cd81fac62da53b955b0c66d0b1b345db9513b23fbb1663dd59b82bb18c2328e8b2756a3e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a0d664598f38bb8aa8e1816102f0a6
SHA156d5bc9be1cbfd6218f738fafe0ef74fd0f17542
SHA2567c5a3168f880d774d3c42a4495f724168b326cfc7fd74ae93882937993c32247
SHA51205827bbb25784fe1d35de4defe98abea6246ca1a3822daf1390ed1992c6e180c8981f178ed71bc8aa0c814e313ff0ded57e949013c7057231d985af3ed36451b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2c1fe8cca7408b531618c98469b215
SHA1c24c07273e078a49d5c2d19d32975f79df8041b8
SHA256a198f23a036ff04b8d973c18bfed024582ff5352f69e073d5a1db1c28e10d8c5
SHA512fce57c6adf06665cea70ce5cf2c9c170468ec4ed4161dadd28054768bf5e075a7d1fdfd731c4badb483ae3989750e857c35e90d79bb532e01a8b8851d7d16084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503385b308b23a1f5e5bfc1d83a4ebf7a
SHA1c23a0d590105af578087bfd711a15b6b9d8ea3c1
SHA256337082c946f7abf3faef946df47464f5cc24846f70920ff7d3697076be2bdd8a
SHA5129e00686c67dcc74c3cc6cd9da39a71288f16bffdc3e74bf392d0f97837430bb55d84486bfc0776664f154259763162fd66444db0fdb2c29704d1c6eb985f3ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57accc8f39bb2c179dbfee31cf3335166
SHA1315082ac25d773fb81a12d45506b6784537fd2b8
SHA256de4b2e6e910ea1f0b63ebb10a797d0117a75312ac01ff21f594099b02ea304f0
SHA51237721e7255c8cccf8f0a9cade0bea825bdc1a32418e48d8bc7ac7d8808b26d4b10c8e375b580c25c4621573b8bfbe02130506c06eecd2994cb716660dd3fefd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e89b5305ba5c0b6ae6cfe613dae9025
SHA1d466673b0218ddbed723905ecd54f952ccea5bb9
SHA2560e52954f6592463aee5a91c0fb131f202e62fb30cb8589ff7f81f82ea38d243e
SHA5125f6011bb61eff44cf6ef00341933eea7504367eedb2762280877a71b67bdf27ea8e970e348091a50e162e7fe2bdd7bce2055652b51a717232fcd54605a0fd3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f6892207a8c40939e3a7edbbb3234c
SHA16b358bb99fb57912d09b2ffa5ee2be4987dca255
SHA25612ef8f6d22ff256e5f39a2d2eb4f90e9dccd7a9ab5a8c02c9ab7a78ec06ef5aa
SHA5128b1d31b165d7c876aaa1b0cf07e05a4a8a73697a031955162886263371fa82d4452fd989a217461ff256d46c02f8e557d80bb4a612734c146d7070c94fd73e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e1d53b2553bfd1f2c5c5621fde64b708
SHA15961489814a6800bfbb08e4b0f7e8af35d418d73
SHA2561716921b1c9e980d1630c716c0f8ed9068b023fa6f2d707ee83bf62f7ebc5444
SHA512b6726a4cb11c7826519e34f6e10b11f1b70f12b555f8455a82a011a10c7525999f29ca72f549eb6690880fbe04cf6c2479754f6af78d5a31171d9ccf6654968d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b