Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
89bb9fdad9bd8133f23fd49a912e1dd7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
89bb9fdad9bd8133f23fd49a912e1dd7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
89bb9fdad9bd8133f23fd49a912e1dd7_JaffaCakes118.html
-
Size
7KB
-
MD5
89bb9fdad9bd8133f23fd49a912e1dd7
-
SHA1
8621f9945faf0cab4e6a158776595021f1f4851a
-
SHA256
92f7abf5aa83f8fc1e298fe22192ff28134c0acd5befa070df74fa397a1f1167
-
SHA512
5ac44f37b73ca1425181fd33777bee024db311f7bcbe45c22378222f724b6a54a170f9589bde4fbcbe968ee90a74ee552d5450beb1a13a95ab8e3085f5442a0d
-
SSDEEP
96:uzVs+ux7afLLY1k9o84d12ef7CSTUIzfNhFBqIYP+YcCcEZ7ru7f:csz7afAYS/jwr9zb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429527997" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87A65391-57BE-11EF-83B8-FEF21B3B37D6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601a395ecbebda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000cf3febc73c807916ab126f645f044e0e4ed163f7617710627472929043d3b89c000000000e80000000020000200000004d55250d9b98f1295443a2d1b8b508995d585ac0d6a8b33ba9c8b11e17a5a77d200000007cc9afc3c503015342ea4fe191623691a2772def8673dd93e01659d645b23e5840000000561b183fae22de73c8f7ebe227bd247864435ccdc61d3be12cf8574932cb087332e0a366663b63951acc3f69cc25ab1cba83d3fe0cf71f224f030ccaa57eca5e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1756 iexplore.exe 1756 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2524 1756 iexplore.exe 30 PID 1756 wrote to memory of 2524 1756 iexplore.exe 30 PID 1756 wrote to memory of 2524 1756 iexplore.exe 30 PID 1756 wrote to memory of 2524 1756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89bb9fdad9bd8133f23fd49a912e1dd7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5964eb69db3c39da1672803668ee99eba
SHA114c9f97ccbbb59a9ee0620446025050060ae443e
SHA256d60339b33af671070317dcec17c2d13d261ebacfc10a86c1d47865f248be0e05
SHA51262844a0a4346bfac90fc4aa253db419a104732ad1101682db1cc3a1380f35a1721fd81d6998151080643df43474c388b9ad6c6b938a8baaad17c2d978f868965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576d1f22fadfb8493ad64e977f75938d1
SHA14c4b52865e123a3f2f98cf3f4df8ee81101b86f4
SHA256f3daebff53b66e0e35c919f7f6c0a168b962e67980731db8fa174051ecd5a08c
SHA512ec5ba81521b5b13f7552ad295fde07678dd5a66198000e9cbbb842b20e0f3fa6fc2f811f04a8b9305bd4aa60fa00ef54ce2bf540b80ede06281c8e847b33b71a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567246e0489ac808d4afe89828b460fe4
SHA1f4fe2088d5b1184a0aeaffd1bbfa620eae8f96cd
SHA256361fa5c5096d30a7c39f305067f0e32f3b63358e932b4378a49d835ef3eba2cf
SHA5129267efd684dbf783b99d64a367878bd7e28fe46ba76829ecd20e144083a475c78d7d79c3539fbf344ffa408587698e9dd4818cce0ce4977ddb05fd51f39e1105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d33a840339e1511dd9b2e37384a1cfa6
SHA1dee7153ab4d2948657833d0048ad1e73fca5c410
SHA256dc677d6595ab482497e8b67d00786b86928b16081cd80ef8f1ecc1b68fb3841c
SHA51215305e8c550a6d6f9026a6e6877396a8bc0a15ec3e2e3ff47f9dc75cc9998b9ef58bbc518dc32afc341cd3c3e1585787def30ca806d7a73e0e8d7e831270ee4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cbdb4c50b2bf532a3b18a8a3e471df8
SHA12fd07d6ffcb31743cf0832ad2c686c67ce2f1f55
SHA256657ac0dc00c1d4ca7a99b660c4cd8b7ed17a1b9c612c8e36857fb632b62488b9
SHA51239df607beaff9e3a74198e5d453b427ebeb2a118e8e7de95a5c978fe1c7264b80ebfac85ed646f8492584bfe4fa5b9477e5dd9afdba9457287e974ec0d32dd08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58401412a0e749d9b0d6fee38de1cf1c5
SHA1a7abeb9b8c9b4ac7738e4338e36e111ae6afe210
SHA25671a24ac568f73c1de30ef0d37fd005755f2575b237b8faa704f817b8f30e3373
SHA51229776c4a8e7aa9e88536b5fa3b1e566144afb65d98d9d19c8cb9cda6f7793ab32348e7c44293b3d0802af1d9371f272d9c5e458beeed5c28739a6cbda8251e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c42a2f34e9c5f84e3ee5f713cef0c36c
SHA1f28e5bcf2ba303c8096bf72241be90be19aa2ed6
SHA2567f424bf61a92a9e4af1939778a2233f33708c340110ab99d56720642e47dc737
SHA51237892468ea1985bc27c50c15bc8a604e3bfb0688ee63a1f3c18aebc075a3ee14522193e210fa0a0ce49b7a706a0dd102efa1faf9bc24e4b5314f61b9584e9664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a7e5e3c89c88640d7632cffec0ebda
SHA1baaac52ac0a5b94bfbef5a6e4c08850fdcbcb990
SHA256fbf59728b8615c7bca9365d2388b28923821bcc7847f9a6470a5340213d40714
SHA5125bca70342bf4f8e63a6c4059c365abfc11de84f4281d4d4625639ab22488e0bec7d63221b67e869ca11fe10149c862b32ec6158901b1c11a085eb09f29d3a365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e170a2c642dd7198b3a9028aace57cc
SHA1b7b353024bb81d11d06d943547c9f739b9cdfe7b
SHA256ac6aaaf0d738d256b7b420263578c571f634e969f8afc9c78d9ab482910eeba8
SHA512a1d734283f9ecf29ce34c1de40d67e46ddd1407ff5ebeb067eda9398264d97d09fa106d85e2d9d123986f679c20fadf403ce6438df14fe2bf5299823788af221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc35ca8f1e8584ed3604892b16e8f10
SHA19b3ff1c026ea93c19c16406929d7dca318582521
SHA256d4f5ab581a7f32267102d0a7c294873c876474e4248980961534e614ee67f426
SHA512f6d099bc8cb4451cd2c300f0863dcfb40d0cf9b432799fc27dee6ea67ffc5b83bcc9bb296353d479ee7e2f656a8a03c340908b5f065e29ef591ced9011b115ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec4dc497c41cf5d69481a93c0ae34cae
SHA120fb7002ca3af17177cd356744020eb62c1abc1b
SHA256445e3e4e2794c99cdaa3560b94c4b8fa3ab0572afe140e1bd43aa719d4772c80
SHA512504c3192da22f0ed5fbf0a88568f83a9ede45a3054755859ab71a4869317388ca4fd7f2f66557ae88a547ef846b0649e5074f3a2bbd3e4f01aebebe6bd1bbe6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507cb5470ba4c837d1d8bee5fc47f6b4d
SHA1bea0d54a318a6b31a75744ca2484a17578a9afce
SHA256f11bb0ae0bc9c22448a82f65da213548f98d15592f0caa4751025ae3983e9403
SHA512ce3a0f0aa36227efdee246a7dcea72cde1034e23d184821a5367ce71a90e287ee5f4f31f7899d38fc91d6da86909fb397d4896c6d36b9caa4f9a91e6d4a54942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54902ca1b7e39f0f636aa3c293f34358a
SHA12154c46dbf7c84a60239b77fd293fab47385d13a
SHA256bbabd648ad4fe3da75880b70fb1de76f14e14423d3e18c8b0349086bdc75434e
SHA51238132950bcb168be469b2ee16ffd40b3843e8b200d332a2dae3c817f243b8b1782a72db2e13eb52470c5a69e22d9d4b61295a0906775e9330944a24b7b7444bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555cf1ae50cfbdae01a7d774bf3c8c5f6
SHA1e04a87356b2a82ca67686e30781d3ae1da416565
SHA256810e671ba24d13d7460514b5af370d6a06b765ed8b324136e7e67cf4abb78481
SHA512eef6e3175b00bba3d8a965468c72215566c6c52ebf655324a40b05f9cddd8fd79c36e49df826b6a7accd0b59e33ced557a8d60a571844aafd139517083f63e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61388c99432c1d058e372d1aacbbdcb
SHA1e1af8da764c86e652f5086b4c1a9932b725e1dcf
SHA256e19b7ef01cdccdeb28cb90a7b1dae6a9c1704d99c75448d2825195728dd3078f
SHA512a2f932595a535575f5dae99bf70df03a498fdfe4835b2ab2cf836ce5cbd09efe6c23759dcd3b92ee70bfc55c31393655988a6c508edc50408f3dd159bff23af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f49f9c416e44f9ceb17e03d59e530d89
SHA18ef37b586b48b7163882a53611ae1c73bf8a2e8c
SHA256136126d8a93a5ce7f1422a94d20838041e178816eab713d61b0bf8f6b00f9f96
SHA5129acf502e7ad592d1ceab43affaaacb5b7bc9454f55d6e4f37b52a48a552a77730caf4c340a3e7bc5c85810497aac32871fb763e68e59f2478ea4197b6176cf2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e77a2d607d7146bf16ee176aeef715
SHA1f4319e40891dba4b45531e3ea750c6abb0df277f
SHA256071e4d8a287e4fabd633720f8eccb5d3e8cb908fc5758c55b1dc3ee40b22f7a9
SHA51282bd15c277671e56e483b389960fb1779eba08be2d3a75d7fa779b1b69f31962a2363fa708acc0f3f258ab433015375e1cd99e6e2bf38e007fc04acc1c64e632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5836c5f4bcb63134985eb961ffda2cb26
SHA1e4e63fa587f15e14fc385fbce99129305954c971
SHA2565f0592278e6378eb628f136cbd088586c030112f1fac183789faf2525c26ec71
SHA5124506241b12c6508dd595ffa74859d6bc7f0256f9132d80de5fbd5f48dd33adb0fb5eaac40607d67f20c43b70637b1b3046a8a09dade43c428dbe249ae9014916
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b