Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
8b45adb0584bc324f98c93201db1aa45_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8b45adb0584bc324f98c93201db1aa45_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8b45adb0584bc324f98c93201db1aa45_JaffaCakes118.html
-
Size
6KB
-
MD5
8b45adb0584bc324f98c93201db1aa45
-
SHA1
9c9a68304ffa7936b9696b3ddb7b8c812ffd14ee
-
SHA256
45a0c07355e714b7cd0282591c53c8e387832d42030dbb5a0c7cf1936325f1a2
-
SHA512
3720cf583dc6d0e52d2d45e84082f575db826f6f8627a40e6b1eaad1e419b8460b3467036cd1850d5b979673cbd761c3d0b405eae88727df18dbbeb21258a006
-
SSDEEP
96:uzVs+ux7+GLLY1k9o84d12ef7CSTUeZcEZ7ru7f:csz7+GAYS/9b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000007447191b98bbd6a91e5efbb6b310ed15a534bd1f603098fea79f3eaf4577d942000000000e80000000020000200000004e828ada6870d731233ed912689b9f54914a5ae4f7f8370d757f3c5220c2ac0a20000000a1492eebcc0947bf9a49c9f04e6e5cfbc72a545faabd4926da42e4f780fd00614000000095194b1807b347b46a2c39d04cbeafb339a60174ad1ae66fa86d045310ec09e2254580d04e9334b2c849977052dc641ebcf74cd0aee16ad86ee3a877838b325e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fd842413ecda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429558830" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4EECE9E1-5806-11EF-9143-7699BFC84B14} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2464 2120 iexplore.exe 29 PID 2120 wrote to memory of 2464 2120 iexplore.exe 29 PID 2120 wrote to memory of 2464 2120 iexplore.exe 29 PID 2120 wrote to memory of 2464 2120 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b45adb0584bc324f98c93201db1aa45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ddfe71afd8a00087cf582bb48fa5f7
SHA1e29356de5576f43774c387dabecec5716e03d72a
SHA256d3025d5369f10940aa57c69e3c942b2da958d09d4d640ffd33c8b15448e572b4
SHA51287242f850d9fb0d89983738cd66d8b545a36011c46fcacfb21c20436b11381bfe04c83ba7d679fba4e1ab2f7266bad82f7d9465ff3872aba7d439e12d93115de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d82dca2316dfa642969c94b559ace97
SHA1a5b0cb8d88ca8aa5a4bdf2eaacb2ac5830b50a63
SHA256a18637858ba6910874efd93c1c8298d34bca36225cf06b52fb658a5b4ab0c6bf
SHA512c86acdcc6ba173b39e391a73641dd8cfabf600808ecda6c52a534dee19e2a71083652dbfc2ea77fee77ade0cd93590a3c55136058b1435b66b17c3a3a606ce82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f058d199a06d58b8ff0ed3cddee49f
SHA141eb2a689bfdfb0aae254a693fc9469787ad284c
SHA2564398f9c3548f411868f0577555cd583c10c5aaa6ab2672b6163c48fced2710a2
SHA512d482412cbcf5fd447fb516d1a5a53f7226974763c0b3f857cb3c9c539aa8d9d296cccf5a4581cb01f9c9e0d3382fe1c2cb9c5fc54e5f3300065e296d95844c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ca9ae856afadf37e12ca8098a03f35
SHA161a373a66674b509d03d4c14dc833846b7bb1425
SHA2563d7e439426065769f53f2e823a2629c1ca610fd2d86f1b97dd60fd1038926d8d
SHA512469f8cdaae2628bcd3ce628fd134f59661f6c525490b0695a141bacbb38e3416331e2d4eb93e3eeb461877ee0ff252f2cf137fe89efabebdbc32f8782252a186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5954ef9bdd858de64692013ab32ca3d47
SHA1581632aa9230c41824bc33a51abbaec6e03236fe
SHA256fe4a08269a3a9c8a3285daeec0b93bb3bedbbbcf933aca4ac3151ede19a8d769
SHA5128b4f98ce71de6f5ecae34ee54b6a0890f963071a82aef656f8be9fae6c48cba1cb6d83c3ed16c376f1c986736663a085630a7c735eddc0a934ec45ace1e1ee52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f955d6dd31a15fdad4e53eefb0bb425
SHA1ae17d6d9aee6f1144f9d494641f588c8b6b5d678
SHA2561c382ee640e91b07c37961ac7cc1be66ee33f93eac972d2f184d4a8314b08dcd
SHA51252e4a4d3170cb3b2e0f50fea57e3ee91893f61271dafb15b71755224eae282341f305dd651e6de9bfb7cc7f7b1055b779bf0257aa9bcbc771f6866e4d754eb06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d26d48ca64d8b3d4de59c976d3c918
SHA1c7409adfbd766c061629cef7f854584942d42fd2
SHA256e08c3c3594342069a125aef338aa30df389ef251743768123c56331acf63a654
SHA512b5a3fec295e71853f4ea5c8d3b6d59b19c86146c87319ef632a41f8e429a9c2c725de6b5832c06442c9bc7e53a6bfef967e07c1e8c892180b10020bb903aad85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f5d9812b8adf2eb7a7bb1d32487be8
SHA1c08d7a17deb5fc30d5fe4f901a164ae82e16b54a
SHA2561a2ce1b4de6123d5bcbb7c4e38c57f4eb6e1e32671e7fb46b88687d6385dc801
SHA512004be7bb76d50682ac0b5840db4da25a0c2a67d05092a6045c40a3a25fd87da7437a0de5e1b41b7d0fb471569378e589e0d716dd9244a5f062d39a59b9d95bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f6d99218d505543437563d535bf77ab
SHA1a696323966725731b265aedd7c7154440638a890
SHA2560c87656bcb240f563fb9410f3659fd4c5490dbf735c244e3e07e954f7d7ae09d
SHA5127bea996631d63fcbd33aea75866947b86a5f6f6b30492190df19cb5c9001ce340e81f95fd0b949b7bef7e683a35054b13e899ac92734cd086fb2879edab624ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94746bafd118ac1a5d8b964131498e6
SHA12a282d5641c34c5c5e755c49e022780da3ee0d7f
SHA25656df5269be4b38f147dd9df7a62862f0dc78b1c4e9a106ab5d494276e5c8dbb1
SHA512cb7dd946da40138e53b70098f0905c091e2ff21e65f99e6575c0387f1e086d72ce9167dcd9506ca6f43dea00b9f52b9af2a0e3a5f7114346bc79532821768e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4bcdbbd3e51f8465d8920f01c9183a1
SHA104a77b3af7a4280f2d15e0c6e812aef4c23a6810
SHA2564a1d4f0206c1149309eef3eb71d134bd709f3aaa12d095dea88f15d7c1332388
SHA512679fc75d8f4546a4f423eabac142cc1d7e10ad0f7d88c1275b9b07d1829a5e11b5bdaf22a96c5851d66fca00b4ea838ca8797b197516f73c27c33337ba66d84e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c26e27400c1f734263f62c908ac87e7
SHA1e4b1ef17ceb195137dac0766c9cc4bf450f81e94
SHA256933de4a470e5c3589d9f56bd756d8db9c9818766b86d98e8d9913f6997ab382b
SHA5128f8e410382e9a9ad8e0cbe3869e920b3da44ab116910b17bd449c971b0d4d30c38e3f95e7ae3282457d866c4fe36fb6289225bce3e97a3ba54522e941f869847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f98c4d93acd3486bf42006e4d6a66f
SHA115ad88188db03dd8511f69bc1db86b2ce28ed021
SHA256c929af25cc15f020606dcc6b4846605cccb1aa459252302237c95687aa9fc804
SHA512e6e0b47f71edd68d22eeb68243c6a0c08f87d369e31b92d40e3bf2774c8e2f4fdc2c895b355e4a87e5456b0d67bc2752682694813fb9117b608c444057b98c32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb1605ec3a986cfbbbefcdc52a78756
SHA162af315d753147bdbb46ab0b9baa451e55a6a359
SHA25636b6f47240514f06985d889566aaf1ad3ef6f87b41358eb83f053bab94878553
SHA512d25e4ff2be94bcdf82a041937594936c1a57cc50a3ec87cc15f32a3115b445cb226143316e39cd9bfb9bd74c8aafd84bc790147a34836e33124097a68a4e54a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6e5ba8b07abbe646d6d20bf4c09043
SHA1e8abd2c06126ce797489747f023d2abaf5e2800e
SHA256bdf5e9cc2d09ad74fe946f6594ce0534881271a2a0500e5947ec3a5cc5573831
SHA512023b5b44c354f072c725814699ab95917d18f267eb1cbae932837c35d36b5176adba727406e9eeb2748794ca0e5987a2d23e893bf4f2f2d4b5f364e259da4b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599206b1d55240c61d99717b71b2bfdac
SHA1f2093c6352c0d22cc0363b86996589347f91f4c3
SHA256a717dd8032edfea1b7d8cf79e7ec1a76bfc6ef6e98da98ab4c39a83b4b8dc62f
SHA512f9c800d3f6d3c1282c38f1eee392c85259260cbb7e1683792100c78cd0d6c03ba5446e3e3e49fd97e3ceef63caf2b5a639a779cb7b20d942c710e7be60747e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da329daf04e24d184e28efa1c503604d
SHA116e79f6f54df4f8a4706289ceaa5808f174e39f1
SHA25631f460133be21cbb8bdcb3ec492f078fe864c13938b7ec20caba58a8ff92f92a
SHA512676aaaade8c6a7f9c9dc657dff38dcd88281db778e782f8b2d9a53f22238c349f51e16b74aecc64c8939f750a862f3211df5c448645e60c0af67a37a215af1fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5016c35233e0f75e42825c019d0942290
SHA1750c7269e1c21636010e86f28db00d8a554110f0
SHA256205fa77babebecd481dedf54cee3ab59c927dd47eadb1af1ed259c7dc4898e2a
SHA512ee82a4421d0243c44c99011f6d5f82fd41538b04dd1d4fefceacd938225e67d8f2d49cf91ff58147bca7ef1a45d43a938d4162ae222e103493e42454234799f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fcf62983f1d9b643842725b37cbb413
SHA182db44a5a20d8d7d99843b697ad1dd5d1fe79ddd
SHA2568b400d48bea395d1f62d8fe58fd51e3b7e8e8947a8b4abf79a95eeb3590c0e8e
SHA512d3b69ccab82b3b30d641b0290a91ac222039324711ecbeffc4074d90149f3a5771936e4a71df737b5d21993ec78fe1944ff672d7b3d72827e8192b68ccf0c873
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b