Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
8b8444348737624ea71aadbdbff25849_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8b8444348737624ea71aadbdbff25849_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8b8444348737624ea71aadbdbff25849_JaffaCakes118.html
-
Size
1KB
-
MD5
8b8444348737624ea71aadbdbff25849
-
SHA1
eb7b577322f5e7e17adaa0a53e04fd1d7266f403
-
SHA256
a20e042c50fdd01ee9c66a187e035f95e8292d2126a0ca368c2fb867aeb1538a
-
SHA512
fe66cc2228de5246f0064b7f7317cacbad580b1202a61fa27859827b5af5b0d10d2ae17b84f1a48b8346205641b2b5efd2f04e97523e7d3937177579321c0777
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429563289" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d052cf951decda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000060f09be978e63d4e19ed33f6de36177ef53602ac30663fa687d6d3925a5d0d7000000000e80000000020000200000004bc69495279ad932631fd26cfadda340699e05163af245bf616214c9c8be882320000000e5ba75a3edf0023771f3e83c05d25fc59dbd7ce78101ebb98bf758c0b408d77540000000d18d7e1b080c42bf4490aba1a0d87f6e162d3731f71c63c1035d9ab8d327aae21d5c59a55a4b4b985ddc846354d29740c68f1c335394489ca501e7fb26716170 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2BC8111-5810-11EF-AB0C-4605CC5911A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2176 2388 iexplore.exe 30 PID 2388 wrote to memory of 2176 2388 iexplore.exe 30 PID 2388 wrote to memory of 2176 2388 iexplore.exe 30 PID 2388 wrote to memory of 2176 2388 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b8444348737624ea71aadbdbff25849_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9e34cc6ffd64b3c16a8ae7d9a7ff576
SHA1efc618f092c168f719109f5b18fe977c19832077
SHA2568b9e67248d4793274d73fcedd1912e9e091a6ed01a273240f343998f73346111
SHA512c8390974da3d27bed8d105e4bd18a28f15f2f4e0e906dc3a918e4daedc0923969a0a16bee786d38867e1df1c53fdf570839d7a056ef10210b25c4d062c705d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c647c54b06d6d8e8f916c53ef63178
SHA12f9725f2834ddd79d7041a46830a418dee8e4a2e
SHA25663e20d7d203e12d75b6c1ef0151ab232a19999a5b5c546577fa14fb8a733be72
SHA512dd9bb9b73df955b9f6fbaf0e1c061a9291dcc33e3130f6c182d8a8dee3590e9d219b96231e3e802a8ad8bdda5c62d87c2c5fc89929a68cdb11d9befcfb1a7d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5477c54f0e0fbe7605b6bcb040b3b3803
SHA1a9bcf130cde29c888556112a090a560887422c69
SHA2563e6c28d224bf22e3e5450b426172d0c16fe0a8371c185807236ca33bf4b2b5cc
SHA512a7876461342463d8be13cf2b2df52a73aa7a2634f3f15167cbc5879ca7e56cfdd862c3ddfc2e147da17837c52184ffceb45234c128988dd29e993da64ba06a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe8f9a9c24066e5be6f2f6649eb2caee
SHA1e739ba5ad5e81527e2103357b5cd8624ae3c27d1
SHA2561870a4d76899b255fed1361b805217ba32b82925e7078b9094d599278d796e38
SHA5128a9c4ad5a90f7ec2b9777ceedcb6a6b02a484576544a8585a43d998a1757fa8506c3ccb4acc006dc974e942a2ec28cdd54ea9a997424b9c2ee83967bb03e925a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f996b86fe0490e08a2ae60161de0e952
SHA13f6833da9d37b7c1f199981e17f62d0f945034c7
SHA256933883d02a5c2c207bad06ddd6e96e6cee56766715eabcd967dafbb2183686b1
SHA51239594215774e59ea84dc9eaab6c980555bc0b0b36cd48a79773071214c2f189a0f9b3c199fbd45902f55e1ce38800d3c31c0196372b6afdd0f0120dba0c6eedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f110d5f8d4d5bea6f2fd6037c149c3b2
SHA1de6a060589dff33c650072b40df9c2e3b068ab40
SHA2561442ac42a8acc5240a7cfcea61ae76a5aa3921653f22ebeef48c5ebaf3f5c946
SHA512009cd635b56d8078ae5ab66048ef33c854f0c260f1c9a331505f4ac40d5dce3daa4f59efcc66cdab5d86cbef93a9320746c1fededc2fffeb652c8d59edd31d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc7a3df630684a6290f25f4cb2d46d6
SHA1c8ecfd7225b586e10bdb54239cb03ecdf6053cb3
SHA2561fe4a36b769d92c39c01f3efb23bbf832adca2e36b80df912599c56b77d4f51c
SHA5122154c5984861f3ab353ba01a3813bf3f05f9bf6a87115e5cab34fd28613c7d180d92847be0e6a208643eac3b11f5bfe8057607d769e64d5cc86be779d5f7b58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5204eb8fcaa33d808e03eba7bac8e5e6e
SHA17677fec4c0ee23eeb58d173ca40647ab78963758
SHA256b7849aec7791e185ecb8e256d11907a9227495d765f39220ec681f4722e5376f
SHA5121149bf8ff3de14c73d35f423f5b7e400ad276ed4d52dc62e29bbe77d24b4a9df38940a25e62f88dc7592fc3f5410831337d954e39bc933e529159c4c92fdb4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57855c22a6a25979edd407a182ef2f8
SHA18f7d6c7968f38ac544d9902132a091b0e8a5cc79
SHA2563964f358ea1f1a1b5309341a7780a33864817301395b85c348e1ab0538c03c27
SHA512d3c7d2be82cf49ee985638f4352515cc3711d9ed9d9aae8e3afc621143555b9f3200ce3fa47de9e65bde54ac427dfc77ae2565cebf1605d88bd7e1a5eca3f480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58df818d9d5907d6f0c09396c99712b57
SHA1a793dc1099e7435955e755a4e8ab0ced8e4aaa33
SHA2562a4fee4cd03258656695db5ab2cea6b4951ab9bdb691be61ee35b61a722a2c93
SHA51218f5c99b877217f7b0198bd9e7e5bfdad8bc32913e880f6f35c93093f34ed395ab91a734ca75fcd1b96aa994372488c6a356d7697056b2d0337080ffc371b250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe53ceb44b0016d1a38cab1bd75cbb3
SHA13e64e6d5eabaff04fdf345a9206ac5c16c17737d
SHA256dbfb3b05ecd04b195c4a7d0b7b5abec6706a7f6317d9180adfc053243de6226a
SHA5126271381d655b4e3a12182daaccf3a1fee68c5d8200139f418726d4b8d977973826a7fe7ab9b3146d238f0ef305ade8088e0e9e12407459ffbe2a394d4c767ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b93e2c41bab6a759eb2c1d32010126
SHA1766064c49580843d106bbb5d25b331c94c5f6bfc
SHA256f4db35d0f4640b9d80eaf3b2bfbdffd0f069afc6899cb0707476a8062f41b845
SHA512c40fb86ceede3c3b7ed5e66cbde6fbaa81f3fd055da9de0a80388493c6148b9bc4c8f80b6389e5356e4ec3c67d1432f9fe339f668cb74ddd5567110c65ef4789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5263a5fadc74c1f2851f1348196de45f5
SHA13773e8b227ba6cf6f78ea9c12376ba2ab6bdccd1
SHA256131dbc11ddf75a9a60c1f708268fd8f64a97a31a30aeac418b40a72f00550824
SHA51203317b304eecd010096a7b22d050c37ffc67def6c3d7773e6463cefc64675be86bd1fc51993a0acf0866714fc97e680502ff04d034b8f86f2f8e30249e3c72f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5359019e838d829812d38f1b0d7057ac9
SHA1e50bac2b85aa931878e1dc91abf29553c995c9d6
SHA2566bbf4f9f5af1096e9ddbc155e60cd519585c4ad891a0c3a654d8748f2f72c6e8
SHA5123e3e358aba1d0ec387f2505f33f3f97a8b89e7f8dbbd174996631fb85b059b7a44ccb3f74027fba562bc56122203cd331df7604de483ecd1db43026eacae9e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d6e70c93b62ef0dda1b179983910a0
SHA1971f0d57afa158b21478ef009ab7200e29914b10
SHA256b76599e885ac8cf44025fe95dd250000d84a3a0b682e7ca109ddf64f6e32c3a6
SHA5122da5b3bfde5b96ebbeba4c0e89e6197d23985e74679f080961466f7218abd27943f0c5fa0d1642ad555980cbd4c580745705de69a784b13a69b546ec510d890f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e85482c578244c64b02304b65f6dad2
SHA1ee7a571166fdc101567d624fbf66a2c1693dccaa
SHA2569adc47ea7ce034251877638d9119ff1e151a1a5e149b1d150fed52ebd32160ae
SHA512566ca13f06e0a15e34d414a88950b365768945586430d6769e80128b6254aaf72cd83f107f1518e99f787aca149062074afecfadaea3357a32d86b860a41cf7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c36577262b73fe47d7f31497b74c5981
SHA193f1b15410535ed743989c1c24d7c65e12b47836
SHA2568a64e58750cbdb1827a1d5f0c0f7d682194684efdf4c610b1587f5a159aa7ef9
SHA51205ac75472d4babacf7bb89d071cafc71d4fee9469855aa067cddb407639c0d249035af058d1c9f4078995ecf02900bc770ae8cfe03990bd07d4de915884511d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eeff4211579800a73d771ed1e5a858e
SHA1ca6bcd43c60b444b22b7986d49a248ef34afa163
SHA256bcf2ada9999974ec542938f095ad8b628e045414cf240d5f5d3259a198fd965a
SHA512ca1883c1e6366654f278ed4d70e4baa3d4e331d98eec4e73ecea1d88db3d32d593c93162df7341b2fa8209754819306fad9ed4f525a2b4aa561071e59217a888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acdd7776caba4ae538ead96369adc594
SHA1f075c5af2d17578ef53305f16e2f489c0e9d10b7
SHA2565e7445cbf5e4f5079e3c65e053cfcf13366d14fe18f2c17bc32e076d14dbcda5
SHA512c34b264558a2c8e5617ab4c5546bd14d3a8712478731c52d4534f07c7f5950b39a5a61f07fa126ecfb9a35215a2e7e19d50f5c27ac5ed4288618513c2987b3a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555d4642afb65a8ecb40450c45a005c77
SHA1e097d7d5e8635eb39478c982967bc44f6db804bc
SHA256e2993779c37cc3c0e8de2f8270735646cb5d65ad90c450bf2a82bc7831c717cf
SHA5123449750221647222c5da44d10e5fb805ee2e07631448ba7ab9782451b8d65668d2e11ab207bdf5b9aa16636f442b158eedb3b0ef0b1f0f20b6a1321969df3a9b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b