Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
8bf1768500cdb25f8cc1e0d847c923d2_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8bf1768500cdb25f8cc1e0d847c923d2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8bf1768500cdb25f8cc1e0d847c923d2_JaffaCakes118.html
-
Size
10KB
-
MD5
8bf1768500cdb25f8cc1e0d847c923d2
-
SHA1
e849e786244675fc4e63deeae3fbf273f87ffd5a
-
SHA256
922cda8971e09f2a7de55ce5a504acbb767a929bd718244e2d7ed38e9cc81d3a
-
SHA512
199fa2a2f47afc567bd77154f00d4618a3d71c2261e98c75758791d780f244cf5d2a87454dbdd1c490d9f657df97cbaee4bb59c3e43d5ca5f2ee33424a4413c5
-
SSDEEP
192:594lIoaNNHofRDD8Dbmmm7mmmvtzZp93GMX+DDbU+HB//PnNwWww2hA9mmm+Mmm2:j4lI5NHS4mmm7mmm14G29mmm+MmmmP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00e201031ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000c1c815549adf028e119af9030583b526f738b232aede9e8e3ed5d2cde048084b000000000e800000000200002000000047e3886a9af0e20789ca117d48e367477db256cb380080e25f3902d12a9fd114200000005b619ea83fc43c965f668e8f222d9efeee30b8f762fffdfa9c3d4e3013ec1da140000000e52a83dbe1151d1bbb983c6def97e062218c406ce6f4ddd24b92c69eefcae8f23ef45a9b850c21571b2a931101dd5a4ef02db206105406dc3c3ae7a54089d4e2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429571678" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B8FF5E1-5824-11EF-A17A-428A07572FD0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2724 2716 iexplore.exe 30 PID 2716 wrote to memory of 2724 2716 iexplore.exe 30 PID 2716 wrote to memory of 2724 2716 iexplore.exe 30 PID 2716 wrote to memory of 2724 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8bf1768500cdb25f8cc1e0d847c923d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522ed93b3f846863c2c0dfc9aa2b37dcc
SHA14fba131f253d988463df8603ae431b8ee0cafafd
SHA2568a326ff16331c13e664051e941127626c931548068a312c94df2010aa7639e39
SHA512b68258e0cbea4a1ddf476c14f879ee85fed38d627a7fe82e83140fbf7a1255776f7184c97883e53c5be957eb61b8746154341bddbe367425bc6b89bef8c9faeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544b37a35fe9f33217f9588284f595ee9
SHA1a970d9bdf9befb8ffa6f76ab63d3a2eab9463967
SHA25657c500d2bc20d108a964ce774c548aa4fd74e66a466e5dfb009766dd3391bb72
SHA512191203e0fc0eda101dbab787a8761de0ac1d0794e970aa28e79f98fd4df9c5981ec318069380ea2e02c6bf333ce58541db55fbf958fe15253345f1842d13fd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bfb99e0f610f8a058bcba54c632fb49
SHA1522aebd624506afcf73c659abb687ecc1fe32948
SHA256dcefd864af287be295a810d488644e09f4550fe4315930e7a66d46349871c139
SHA512785b790c34bdc80b310e6a3e6cb19b7547ae4967522c85e818b2292dde3d8c02cb3fd32fb55f19d18a5fe2866306cac0d30cd9d6880b1a0c37e1e06cfdfb2120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5899cc57dd4634a9ae7dc1bde3f90fcbd
SHA14f6c8f982e3db5e50f142209d48691478ca511fe
SHA256da846349daee0e9a3f1ce7536fcb87a16828b09d0a3a8ba26a9bac1d47f564e7
SHA5124ea6a8dc02b31a4931590856e369afd36f5a003da35d75385ca3369a17259e8e6014a68f9bdedc781b631d403bc3303c6e4995815adab30252c066ba63b6ca49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c38cd24782d15f88464db5a9b0400873
SHA1bf77c17e049db40799f42acdbb5683ab79fe6500
SHA256c01beaadcef1435e2d8bc1b052be761c9a4c1f5504f3790bdf271c5785ea8195
SHA51244964e7e9507ded8e94d3c1ecfe3756add3aacdac5e32d55a1bc631864d27e37183b171788aca62a5c4d1e9bce3c35c4bd587292478f53f91b62fff3a86aa14f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75d10d7326d98fadf286fc835047120
SHA1686bbf800bc5c71ebbfee2f0359a44ef50a4d169
SHA256d2f6497fd5b0bc470980802087b15b7f4daea3fef4addf89430fdc1888ae3c79
SHA5124549d34081e01809d7e926058846a5028108881088ed4696f38561c280149e40347fc348473c5fb45df42cee34d1a9040b3466e5810b80542b0a7715e8105067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a600d785dc0c719f2926a58474d2cee6
SHA1fa22cbfb24cfe98572c8674c84e091de78f8236b
SHA256f862fbc8df7a885e8f918ea9870523b0c6b09ac1adf92980ee6ab43a73319b3b
SHA512cc89ab97611de196129be28fb889bfb9341909669daee4cce8cb589c38ddf4a13998d8c8605cfa5078e6db052950b15e84443c67e675b37a8ffd53d8b1ad5261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e16becee52421c2362434263d3eebd5
SHA110f2777c7a0e74cd8d1e5fa5322aca6adb19f2b0
SHA2569e252af47bcadeb88a98aaca2423be5b555bf2231014205788c3b358bd92484e
SHA51231d22cadd374960f24a307c7a2b121963429ee8c6ee0c29a7f984560df5f4c9a8d6c14269656b4e474d73ca55449538c77a8e46b010d96eceb67fc4b76fe4d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b54950837410b77437f59487f602ec
SHA12f40aba36433acc360f43824c674bda1134fcd2a
SHA2561bff942207fe3a5ea4dbf255e67276919270f5c35afcc60e14fdb3ed47c37a01
SHA51235c6ad815a62df6b2d2171c271421824ea8767d9ffb43c7814c45d11099358a4d7c53628909115117beccb57f2f4f2cead1ed200cfd863f94597781b2bd7fa50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5239b826995dc3714729ed1a2c6ad8b0d
SHA1c99e30f8ac2b2507c02612027e8ca9e717d717d5
SHA256d9369490ac08d34f38fa0a6a647ede5e77bce1cf1a0d56e5d1f2970be180aea9
SHA5122552332f22700d814c12095ac0a8b180383eb0efb23ecc803a1462cb10e54817d63d759fe926e7a7297d70033076c07688508bad62c564f2d59dda40c14fd385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b981ac4455318fc1c1dd8a00c2f995d3
SHA118d189acf22abfa14a9c5631e76598e5f5a607dc
SHA256160b69e2a42aa0b9696e4cd1bc6fb614dcbf9ce5aa9cddf1ed926f120a8b4be8
SHA512236a132bb4443eaa287ed0bee22a2fa7d5954c67d050f19c04c3bfa6f9ac9b82be3da62e91ceb24b73436db335d0a277bfb66a8a948d44372be3af09e846dbb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5076875260fabfb3389941a4f8d35d9d1
SHA1bc703c29b6c10b1de0f7452a03d73b96c14a7ca6
SHA2568d45c8af2e2b4daa82fad4b69a8da8f9b9ca6367b3df758d0c423c2c1192b5c7
SHA51260e3bd9d02cc23242b08be03689ace3e42b00328766675645b10f04450583803f66825a586b3fffea51c2ef25775bbabda55ef9bb0ace04344415025a93a943d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf17f13f9fd19eeb3737180ce6bc5818
SHA1ab5fbed374aea447cbe0a9c4e5351e4da015876b
SHA2568fbb68a9cf05c65a1938745688d626ad58f8475eab5bb725ca6233f0ff728d01
SHA51234eeef34f6b8098d57479666be3185028a2c0561cedbf3509a5ec5ee10c3da27b91c0e85f56d27416b898b5bea8447ff7e8ddef5e93688da8e9f7bb259523725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c110ec683c294bed686e09308906ee3
SHA1d86174b0594e83263c77461528920efd2626cdd7
SHA256c0d2c74b5929fbdec0f863d308cf265fa46e140c94e5dbd8a203cd375cb764a4
SHA512e2b13af7608db84e029e99d2b329a81f2ba9f4a2dba4e40bb9c52d7757228d592bc90fa5d9de99af5c3d3b44ac1b4faa32e1cf37842cb74b5028fc554e071b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f5b2a48d389803c718ecff661005d28
SHA1ff8682e24a3dd7dc50486ed66860c50879b122aa
SHA2561343ee7839e47d63aaa48f49a3c4af27c59d0509dc8a0aceff2266311e48d54d
SHA512e9c400372e66ab6d85f430d5000a6dc4ac741cd3fd7e565643ea137bad097593d693b2be21fefcb1dea90e6d1ea1a8fd727f7b8ea612adc5c949eeadc5bfe6d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57199e54326a8f606d5f2333e53422342
SHA16e9c85d8f59d7b2a8bed52aeeb821bf6bffdd606
SHA256d30f64dcf23d6adbf7dd977da9a935ddd7dbdf5a9abfcb749cda9655f23f3383
SHA51201f6e3a4062d4ef8c6bdedefeb4a2d3934f9c057953f6f323759f94b48fb6371b59b8f535942654ff9c1d27fe6ff9abf8b49eed7a49d5e3d77dffdedd9841d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558bb69f85688c6bca13ffc86a791fe41
SHA14ba224d1a7d2a5260dfc66e52dc178ac9e46a202
SHA256bf64235aa216361fbe2a81e09c008af83655f0cce1893b54c112e358320d5a16
SHA5127879def453bc5b5913e4a07dd46a706c5aa329a88a9a5a8d1be24518d8a2f9c34465a2f7bbe1e6bbebe3019e988348bcb23afeb38e9b59562caee47329b8e7f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a11c3f632d77001b190bf812f5b8bc9
SHA115f45752a7463f971874b8338e18c15f5dd4a8f7
SHA256babf1582c430e20077c12d2e640128892c04b6e791ffc044bf128dd5b4e7f4e0
SHA5126ec2fb3a68f13163c974ed3b39f267174138ef4af0e06a6371e3f90387f0041aa17694ada2d8d51ded807278b202f73530d7c06d77f75b73eb6895e67a5b76bd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b